Security Challenges and Approaches in Internet of Things
โ Scribed by Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi (auth.)
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 110
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.
โฆ Table of Contents
Front Matter....Pages i-vi
Introduction....Pages 1-3
System Model for the Internet of Things....Pages 5-17
Vulnerable Features and Threats....Pages 19-38
Securing the Internet of Things....Pages 39-51
Social Governance....Pages 53-75
Case Studies of Selected IoT Deployments....Pages 77-94
Conclusions and Future Work....Pages 95-96
Back Matter....Pages 97-107
โฆ Subjects
Communications Engineering, Networks;Information Systems Applications (incl. Internet);Signal, Image and Speech Processing;Systems and Data Security
๐ SIMILAR VOLUMES
The Internet of Things (IoT) can be defined as any network of things capable of generating, storing and exchanging data, and in some cases acting on it. This new form of seamless connectivity has many applications: smart cities, smart grids for energy management, intelligent transport, environmental
<span>This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/futur
<span>This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/futur
<p>The book <b><i>Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures</i></b>ยฎ covers a wide range of research topics on the security of the <em>Internet of Things</em> nodes along with the latest research development in the domain of <em>Internet of Things</em>. It also c