Internet of Things Security: Architectures and Security Measures: Advances in Computer Science and Technology
Autor Chuan-Kun Wuen Limba Engleză Hardback – 4 iun 2021
It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measures need to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1266.70 lei 38-44 zile | |
Springer Nature Singapore – 5 iun 2022 | 1266.70 lei 38-44 zile | |
Hardback (1) | 1140.44 lei 22-36 zile | |
Springer Nature Singapore – 4 iun 2021 | 1140.44 lei 22-36 zile |
Preț: 1140.44 lei
Preț vechi: 1425.54 lei
-20% Nou
Puncte Express: 1711
Preț estimativ în valută:
218.26€ • 226.71$ • 181.29£
218.26€ • 226.71$ • 181.29£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811613715
ISBN-10: 9811613710
Pagini: 245
Ilustrații: XIX, 245 p. 79 illus., 29 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2021
Editura: Springer Nature Singapore
Colecția Springer
Seria Advances in Computer Science and Technology
Locul publicării:Singapore, Singapore
ISBN-10: 9811613710
Pagini: 245
Ilustrații: XIX, 245 p. 79 illus., 29 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2021
Editura: Springer Nature Singapore
Colecția Springer
Seria Advances in Computer Science and Technology
Locul publicării:Singapore, Singapore
Cuprins
1 Introduction.- 2 Architectures of the Internet of Things.- 3 IoT security architecture.- 4 Fundamentals of cryptography.- 5 Trust mechanism and key management in IoT.- 6 IoT perception layer security.- 7 IoT network layer security.- 8 IoT processing layer security.- 9 Privacy protection in IoT applications.- 10 RFID system security.- 11 On the IT security and the OT security in IoT.- 12 A comprehensive set of security measures for IoT.
Notă biografică
Chuan-Kun Wu is currently a Distinguished Professor at Linyi University. He was a Research Professor supported by the "100-talent program" of the Chinese Academy of Sciences from 2003 to 2016. Prof. Wu has published nearly 200 reviewed papers, and has recently published 3 books in Chinese on the Internet of Things (IoT), including "Security Fundamentals for Internet of Things" and "Industrial Control Network Security: Technology and Practice". In 2016, his book "Boolean Functions and their applications to cryptography" was published by Springer.
Prof. Wu has been a senior member of IEEE since 2000, was an Associate Editor for IEEE Communications Letters from 2002-2012, and served as PC co-chair and organizing co-chair of a number of international conferences in the areas of cryptology and information security.
Prof. Wu has been a senior member of IEEE since 2000, was an Associate Editor for IEEE Communications Letters from 2002-2012, and served as PC co-chair and organizing co-chair of a number of international conferences in the areas of cryptology and information security.
Textul de pe ultima copertă
This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security.
It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
Caracteristici
Explores relationships between different IoT architectures Introduces an innovative IOT security architecture Presents comprehensive security measures for the sensor layer of IoT