Security in IoT: The Changing Perspective
Editat de Rituparna Chaki, Debdutta Barman Royen Limba Engleză Paperback – 8 oct 2024
It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system. It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries.
As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system; the Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps.
This book will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 255.79 lei 43-57 zile | |
CRC Press – 8 oct 2024 | 255.79 lei 43-57 zile | |
Hardback (1) | 515.31 lei 22-36 zile | +30.88 lei 5-11 zile |
CRC Press – 15 mar 2022 | 515.31 lei 22-36 zile | +30.88 lei 5-11 zile |
Preț: 255.79 lei
Preț vechi: 355.19 lei
-28% Nou
Puncte Express: 384
Preț estimativ în valută:
48.95€ • 50.85$ • 40.66£
48.95€ • 50.85$ • 40.66£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367711429
ISBN-10: 0367711427
Pagini: 135
Ilustrații: 74
Dimensiuni: 156 x 234 mm
Greutate: 0.25 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States
ISBN-10: 0367711427
Pagini: 135
Ilustrații: 74
Dimensiuni: 156 x 234 mm
Greutate: 0.25 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States
Public țintă
Academic, Postgraduate, and ProfessionalNotă biografică
Rituparna Chaki is Professor, University of Calcutta. Her area of research interest include routing in ad-hoc network, IDS for wireless sensor network, protein sequence data mining, cloud computing and Internet of Things. She has already two books with CRC press, one on Intrusion Detection System, the other is on Neural network.
Debdutta Barman Roy has been an associate professor in Calcutta Institute of Engineering and Management, Kolkata, India, since February 2017. She has also contributed chapters in a book published by CRC press in 2013. Debdutta has also authored one textbook. Her research interest is on ad-hoc Network and its Security. She is a professional member of Institute of Engineers (India).
Debdutta Barman Roy has been an associate professor in Calcutta Institute of Engineering and Management, Kolkata, India, since February 2017. She has also contributed chapters in a book published by CRC press in 2013. Debdutta has also authored one textbook. Her research interest is on ad-hoc Network and its Security. She is a professional member of Institute of Engineers (India).
Cuprins
Introduction
1 Security Aspect in IoT
2 Robustness Analysis of PLC programs with respect to Sensor Interaction in IoT
3 Machine Ethics aspects in the Internet of Things
4 An Intrusion Detection System for WSN layer of IoT
5 An NLP based scheme for user data security from overprivileged IoT apps
1 Security Aspect in IoT
2 Robustness Analysis of PLC programs with respect to Sensor Interaction in IoT
3 Machine Ethics aspects in the Internet of Things
4 An Intrusion Detection System for WSN layer of IoT
5 An NLP based scheme for user data security from overprivileged IoT apps
Descriere
This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.