๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Securing the Internet of Things

โœ Scribed by Shancang Li, Li Da Xu


Publisher
Syngress
Year
2017
Tongue
English
Leaves
156
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.

This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks
Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT
Contributed material by Dr. Imed Romdhani

โœฆ Table of Contents


About the Authors
Chapter 1. Introduction: Securing the Internet of Things
Abstract
1.1 Introduction
1.2 Security Requirements in IoT Architecture
1.3 Security in Enabling Technologies
1.4 Security Concerns in IoT Applications
1.5 Summary
References
Chapter 2. Security Architecture in the Internet of Things
Abstract
2.1 Introduction
2.2 Security Requirements in IoT
2.3 Insufficient Authentication/Authorization
2.4 Insecure Access Control
2.5 Threats to Access Control, Privacy, and Availability
2.6 Attacks Specific to IoT
References
Chapter 3. Security and Vulnerability in the Internet of Things
Abstract
3.1 Secrecy and Secret-Key Capacity
3.2 Authentication/Authorization for Smart Devices
3.3 Transport Encryption
3.4 Secure Cloud/Web Interface
3.5 Secure Software/Firmware
3.6 Physical Layer Security
3.7 Summary
References
Further Reading
Chapter 4. IoT Node Authentication
Abstract
4.1 Security Goals in IoT
4.2 Public-Key-Based Authentication
4.3 Identify-Based Authentication, Encryption, and Digital Signature
4.4 IP Connectivity
4.5 Lightweight Cryptography
4.6 Existing Security Schemes for IoT
4.7 Summary
Further Reading
Chapter 5. Security Requirements in IoT Architecture
Abstract
5.1 Introduction
5.2 Network Layer
5.3 Service Layer
5.4 Applicationโ€“Interface Layer
5.5 Cross-Layer Threats
5.6 Threats Caused in Maintenance of IoT
References
Chapter 6. Security in Enabling Technologies
Abstract
6.1 Security in Identification and Tracking Technologies
6.2 Security in Integration of Wireless Sensor Network and RFID
6.3 Security in Communications
6.4 Security Protocols and Privacy Issues into 6LoWPAN Stack
6.5 Security in Service Management
References
Further Reading
Chapter 7. Existing Security Scheme for IoT
Abstract
7.1 Data Security and Privacy
7.2 Data Confidentiality and Key Management
7.3 Literature Review
References
Further Reading
Chapter 8. Security Concerns in Social IoT
Abstract
References
Chapter 9. Confidentiality and Security for IoT Based Healthcare
Abstract
References
Further Reading
Index


๐Ÿ“œ SIMILAR VOLUMES


Securing the Internet of Things
โœ Shancang Li and Li Da Xu (Auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Syngress ๐ŸŒ English

</header><div itemprop="description" class="collapsable text"><P><EM>Securing the Internet of Things</EM> provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This boom

Security of Internet of Things Nodes
โœ Chinmay Chakraborty (editor), Sree Ranjani Rajendran (editor), Muhammad Habibur ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Routledge ๐ŸŒ English

<p>The book <b><i>Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures</i></b>ยฎ covers a wide range of research topics on the security of the <em>Internet of Things</em> nodes along with the latest research development in the domain of <em>Internet of Things</em>. It also c

Internet of Things Security: Architectur
โœ Chuan-Kun Wu ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<p>This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference betw

Internet of Things Security: Architectur
โœ Chuan-Kun Wu ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<p>This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference betw

Cryptographic Security Solutions for the
โœ Mohammad Tariq Banday ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Information Science Reference ๐ŸŒ English

"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of thing