Limit search to available items
Book Cover
E-book

Title Internet of Things Security : Fundamentals, Techniques and Applications
Published Aalborg : River Publishers, 2018

Copies

Description 1 online resource (164 pages)
Series River Publishers Series in Information Science and Technology
River Publishers series in information science and technology.
Contents Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1 -- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT
1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device
1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2 -- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05 -- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution)
2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3 -- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing
3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security and Privacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4 -- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption
Summary Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them
Notes 4.2.1.5 User interface
Shishir K. Shandilya, Soon Ae Chun, Smita Shandilya
Print version record
Subject Internet of things -- Security measures
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
COMPUTERS / Internet / General
SCIENCE / Energy
Form Electronic book
Author Shandilya, Shishir K., 1981-
Chun, Soon Ae
Shandilya, Smita, 1982-
Weippl, Edgar
ISBN 9788793609525
8793609523
9781003338642
100333864X
9781000794441
100079444X
9781000791327
1000791327