Coverart for item
The Resource Internet of Things Security : Fundamentals, Techniques and Applications

Internet of Things Security : Fundamentals, Techniques and Applications

Label
Internet of Things Security : Fundamentals, Techniques and Applications
Title
Internet of Things Security
Title remainder
Fundamentals, Techniques and Applications
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
EBLCP
http://library.link/vocab/creatorName
Shandilya, Shishir K
Dewey number
004.678
Index
no index present
LC call number
TK5105.8857
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Chun, Soon Ae
  • Shandilya, Smita
  • Weippl, Edgar
Series statement
River Publishers Series in Information Science and Technology
http://library.link/vocab/subjectName
  • Internet of things
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
Label
Internet of Things Security : Fundamentals, Techniques and Applications
Instantiates
Publication
Note
4.2.1.5 User interface
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1 -- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT
  • 1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device
  • 1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2 -- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05 -- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution)
  • 2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3 -- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing
  • 3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security andPrivacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4 -- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption
Control code
1049913527
Dimensions
unknown
Extent
1 online resource (164 pages)
File format
unknown
Form of item
online
Isbn
9788793609525
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1049913527
Label
Internet of Things Security : Fundamentals, Techniques and Applications
Publication
Note
4.2.1.5 User interface
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1 -- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT
  • 1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device
  • 1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2 -- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05 -- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution)
  • 2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3 -- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing
  • 3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security andPrivacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4 -- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption
Control code
1049913527
Dimensions
unknown
Extent
1 online resource (164 pages)
File format
unknown
Form of item
online
Isbn
9788793609525
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1049913527

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...