A beginner's guide to Internet of things security : (Record no. 226)

MARC details
000 -LEADER
fixed length control field 03275nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240814131922.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240813b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032400754
040 ## - CATALOGING SOURCE
Transcribing agency SIU
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 GUP 2020
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Brij, Gupta.
245 ## - TITLE STATEMENT
Title A beginner's guide to Internet of things security :
Remainder of title attacks, applications, authentication, and fundamentals
250 ## - EDITION STATEMENT
Edition statement 1st
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xv, 95 pages) : illustrations
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index
520 ## - SUMMARY, ETC.
Summary, etc. A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Internet of things
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Aakanksha, Tewari.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 13/08/2024   005.8 GUP 2020 SIU00002 13/08/2024 1 13/08/2024 Book
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 17/08/2024   005.8 GUP 2020 SIU00003 17/08/2024 2 17/08/2024 Book
All Rights Reserved to Symbiosis International University, Dubai

Powered by Koha