Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation
Editat de T. Kavitha, M.K. Sandhya, V.J. Subashini, Prasidh Srikanthen Limba Engleză Hardback – 23 mai 2024
Features:
- Explores the new Internet of Things security challenges, threats, and future regulations to end-users
- Presents authentication, authorization, and anonymization techniques in the Internet of Things
- Illustrates security management through emerging technologies such as blockchain and artificial intelligence
- Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
- Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things
Preț: 705.94 lei
Preț vechi: 1023.41 lei
-31% Nou
Puncte Express: 1059
Preț estimativ în valută:
135.10€ • 140.75$ • 112.33£
135.10€ • 140.75$ • 112.33£
Carte tipărită la comandă
Livrare economică 08-22 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032435732
ISBN-10: 1032435739
Pagini: 338
Ilustrații: 164
Dimensiuni: 156 x 234 mm
Greutate: 0.78 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States
ISBN-10: 1032435739
Pagini: 338
Ilustrații: 164
Dimensiuni: 156 x 234 mm
Greutate: 0.78 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States
Public țintă
Postgraduate, Professional Reference, and Undergraduate AdvancedCuprins
Chapter 1. Introduction to Internet of Things Security. Chapter 2. IoT Hardware, Platform and Security Protocols. Chapter 3. Secure Device Management and Device Attestation in IoT. Chapter 4. Secure Operating Systems and Software. Chapter 5. Wireless Physical Layer Security. Chapter 6. Lightweight crypto mechanisms and Key management in IoT scenario. Chapter 7. Secure data collection, aggregation, and sharing in the Internet of Things. Chapter 8. Authentication, Authorization and Anonymization techniques in the IoT. Chapter 9. Secure Identity, Access, and Mobility Management in the Internet of Things. Chapter 10. Privacy-preserving scheme for Internet of Things. Chapter 11. Trust Establishment Models in IoT. Chapter 12. Secure communication protocols for the IoT. Chapter 13. Adaptive Security in the Internet of Things.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate and cross-layer IoT security Design. Chapter 16. Edge computing technology for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT Security using Blockchain. Chapter 19. IoT ecosystem-level security auditing, analysis, and Recovery. Chapter 20. Risk Assessment and Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack Strategies in the Internet of Things. Chapter 22. Security and Privacy Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques. Chapter 24. Intrusion & malware detection and prevention techniques in IoT. Chapter 25. 5G and 6G security issues and countermeasures.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate and cross-layer IoT security Design. Chapter 16. Edge computing technology for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT Security using Blockchain. Chapter 19. IoT ecosystem-level security auditing, analysis, and Recovery. Chapter 20. Risk Assessment and Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack Strategies in the Internet of Things. Chapter 22. Security and Privacy Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques. Chapter 24. Intrusion & malware detection and prevention techniques in IoT. Chapter 25. 5G and 6G security issues and countermeasures.
Notă biografică
T. Kavitha is working as a Professor in the Department of Computer Engineering, New Horizon College of Engineering, Visvesvaraya Technological University, Karnataka, India.
M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India.
V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India.
Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.
M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India.
V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India.
Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.
Descriere
This book will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system.