Security and Privacy in the Internet of Things
Editat de Syed Rameem Zahra, Mohammad Ahsan Chishtien Limba Engleză Hardback – 16 dec 2020
• Covers all aspects of security
• Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions
• Discusses ways for achieving better access control and trust in the IoT ecosystem
• Contributes exhaustive strategic plans to deal with security issues of IoT
• Gathers contributions from leading-edge researchers from academia and industry
Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 304.28 lei 6-8 săpt. | |
CRC Press – 7 oct 2024 | 304.28 lei 6-8 săpt. | |
Hardback (1) | 856.79 lei 6-8 săpt. | |
CRC Press – 16 dec 2020 | 856.79 lei 6-8 săpt. |
Preț: 856.79 lei
Preț vechi: 1070.99 lei
-20% Nou
Puncte Express: 1285
Preț estimativ în valută:
163.97€ • 170.32$ • 136.20£
163.97€ • 170.32$ • 136.20£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367859947
ISBN-10: 0367859947
Pagini: 214
Ilustrații: 27 Tables, black and white; 86 Illustrations, black and white
Dimensiuni: 178 x 254 x 18 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
ISBN-10: 0367859947
Pagini: 214
Ilustrații: 27 Tables, black and white; 86 Illustrations, black and white
Dimensiuni: 178 x 254 x 18 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Public țintă
Postgraduate and ProfessionalCuprins
Contents
Abbreviations................................................................................................................................ vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors.................................................................................................................................. xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles......................................133
Surbhi Sharma and Baijnath Kaushik
11. “Alexa, What about LGPD?”: The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing Data
Aggregation Using Neural Network-Based Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices................................................................................................................................... 187
Index.............................................................................................................................................. 193
Abbreviations................................................................................................................................ vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors.................................................................................................................................. xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles......................................133
Surbhi Sharma and Baijnath Kaushik
11. “Alexa, What about LGPD?”: The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing Data
Aggregation Using Neural Network-Based Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices................................................................................................................................... 187
Index.............................................................................................................................................. 193
Notă biografică
Syed Rameem Zahra is currently pursuing her Doctor of
Philosophy (Ph.D.) from National Institute of Technology Srinagar.
She has earned the Bachelor of Technology (B. Tech.) degree in
computer science and engineering (CSE) from the University of
Kashmir, Srinagar, India, and the M.Tech. degree in computer
science and engineering from SMVDU, Katra, India. She is a gold
medalist at both graduate and post graduate levels. She has published
more than ten research articles in reputed journals (indexed
by Scopus and SCI) and conferences (indexed by Scopus). She has
been facilitated with a Certificate of Appreciation by Ministry of
Human Resource Development (Department of Higher Education),
Government of India for her academic excellence. Her research areas include the Database
systems, Wireless Sensor Networks (WSN), Vehicular Ad hoc Networks (VANET), and
Internet of Things (IoT) Security.
Dr. Mohammad Ahsan Chishti has earned his Doctor of
Philosophy (Ph.D.) from National Institute of Technology Srinagar.
He has earned Bachelor of Engineering (B.E.) and M.S. in computer
and information engineering (MSCIE) from International
Islamic University Malaysia. Presently he is Dean, School of
Engineering & Technology, and Associate Professor in the
Department of Information Technology, Central University of
Kashmir. He has more than 70 research publications to his credit
and 13 patents with two granted International Patents. He has successfully
completed Department of Science & Technology sponsored research project. He
has been awarded “IEI Young Engineers Award 2015–2016” in the field of Computer
Engineering for the year 2015-16 by the Institution of Engineers (India) and “Young Scientist
Award 2009–2010” from Department of Science & Technology, Government of Jammu and
Kashmir for the year 2009–2010. He has been Executive Member, Institute of Engineers
India (IEI) of J&K Chapter. He has been guiding Phd, Master of Technology (M.Tech) and
Bachelor of Technology (B. Tech) research projects and his research area includes IoT,
Computer Networks, Next Generation Networks, MPLS and Technology Roadmapping.
He is Senior Member-Institute of Electrical and Electronics Engineers (IEEE) and Member
of several other societies like IEI, CSI, IETE apart from being member of other technical
societies.
Philosophy (Ph.D.) from National Institute of Technology Srinagar.
She has earned the Bachelor of Technology (B. Tech.) degree in
computer science and engineering (CSE) from the University of
Kashmir, Srinagar, India, and the M.Tech. degree in computer
science and engineering from SMVDU, Katra, India. She is a gold
medalist at both graduate and post graduate levels. She has published
more than ten research articles in reputed journals (indexed
by Scopus and SCI) and conferences (indexed by Scopus). She has
been facilitated with a Certificate of Appreciation by Ministry of
Human Resource Development (Department of Higher Education),
Government of India for her academic excellence. Her research areas include the Database
systems, Wireless Sensor Networks (WSN), Vehicular Ad hoc Networks (VANET), and
Internet of Things (IoT) Security.
Dr. Mohammad Ahsan Chishti has earned his Doctor of
Philosophy (Ph.D.) from National Institute of Technology Srinagar.
He has earned Bachelor of Engineering (B.E.) and M.S. in computer
and information engineering (MSCIE) from International
Islamic University Malaysia. Presently he is Dean, School of
Engineering & Technology, and Associate Professor in the
Department of Information Technology, Central University of
Kashmir. He has more than 70 research publications to his credit
and 13 patents with two granted International Patents. He has successfully
completed Department of Science & Technology sponsored research project. He
has been awarded “IEI Young Engineers Award 2015–2016” in the field of Computer
Engineering for the year 2015-16 by the Institution of Engineers (India) and “Young Scientist
Award 2009–2010” from Department of Science & Technology, Government of Jammu and
Kashmir for the year 2009–2010. He has been Executive Member, Institute of Engineers
India (IEI) of J&K Chapter. He has been guiding Phd, Master of Technology (M.Tech) and
Bachelor of Technology (B. Tech) research projects and his research area includes IoT,
Computer Networks, Next Generation Networks, MPLS and Technology Roadmapping.
He is Senior Member-Institute of Electrical and Electronics Engineers (IEEE) and Member
of several other societies like IEI, CSI, IETE apart from being member of other technical
societies.
Descriere
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things. The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.