Amazon cover image
Image from Amazon.com

A beginner's guide to Internet of things security : attacks, applications, authentication, and fundamentals

By: Contributor(s): Material type: TextTextPublication details: Boca Raton : CRC Press 2020Edition: 1stDescription: 1 online resource (xv, 95 pages) : illustrationsISBN:
  • 9781032400754
Subject(s): DDC classification:
  • 005.8 GUP 2020
Contents:
Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index
Summary: A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Book Symbiosis International University, Dubai 005.8 GUP 2020 (Browse shelf(Opens below)) 1 Available SIU00002
Book Book Symbiosis International University, Dubai 005.8 GUP 2020 (Browse shelf(Opens below)) 2 Available SIU00003

Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index

Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

There are no comments on this title.

to post a comment.
All Rights Reserved to Symbiosis International University, Dubai

Powered by Koha