Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing
Securing the Internet of Things
โ Scribed by Shancang Li and Li Da Xu (Auth.)
- Publisher
- Syngress
- Year
- 2017
- Tongue
- English
- Leaves
- 146
- Edition
- 1st Edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
โฆ Table of Contents
Content:
Front-matter,Copyright,About the AuthorsEntitled to full textChapter 1 - Introduction: Securing the Internet of Things, Pages 1-25
Chapter 2 - Security Architecture in the Internet of Things, Pages 27-48
Chapter 3 - Security and Vulnerability in the Internet of Things, Pages 49-68
Chapter 4 - IoT Node Authentication, Pages 69-95
Chapter 5 - Security Requirements in IoT Architecture, Pages 97-108
Chapter 6 - Security in Enabling Technologies, Pages 109-118
Chapter 7 - Existing Security Scheme for IoT, Pages 119-130
Chapter 8 - Security Concerns in Social IoT, Pages 131-132
Chapter 9 - Confidentiality and Security for IoT Based Healthcare, Pages 133-139
Index, Pages 141-144
โฆ Subjects
Home;Books & Journals;Business, Management and Accounting;Management Information Systems;Computer Security;Securing the Internet of Things
๐ SIMILAR VOLUMES
<p>The book <b><i>Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures</i></b>ยฎ covers a wide range of research topics on the security of the <em>Internet of Things</em> nodes along with the latest research development in the domain of <em>Internet of Things</em>. It also c
<p>This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference betw
<p>This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference betw
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of thing