Sunday, September 22, 2019

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations


File Size: 7.34 Mb

Description
In this book, we have invited some top IoT security experts from all over the world to contribute their knowledge about different IoT security aspects.We have seamlessly integrated those chapters into a complete book. All chapters have a clear problem statement as well as detailed solutions.More than 100 figures have been provided for graphic understanding.

After reading this book, industrial engineers will have a deep understanding of security and privacy principles in complex IoT systems. They will also be able to launch concrete cryptography schemes based on the detailed algorithms provided in some chapters.

After reading this book, academic researchers will be able to understand all critical issues to be solved in this exciting area. They will get to know some promising solutions to those research problems, and pick up an unsolved, challenging issue for their own research.

After reading this book, policy-makers will have a big picture of IoT security and privacy designs, and get to know the necessary procedures to achieve robust IoT information collection, computation, transmission, and sharing across Internet clouds.

All chapters are written for both researchers and developers. We have tried to avoid much jargon and use plain language to describe profound concepts. In many places, we have also provided step-by-step math models for readers’ security test bed implementation purposes.

Content:-
Preface
Editor
Contributors
SECTION I: THREATS AND ATTACKS
1. Internet of Things (IoT) as Interconnection of Threats (IoT)
2. Attack, Defense, and Network Robustness of Internet of Things
3. Sybil Attack Detection in Vehicular Networks
4. Malware Propagation and Control in Internet of Things
5. A Solution-Based Analysis of Attack Vectors on Smart Home Systems
SECTION II: PRIVACY PRESERVATION
6. Privacy Preservation Data Dissemination
7. Privacy Preservation for IoT Used in Smart Buildings
8. Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles
9. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing
SECTION III: TRUST AND AUTHENTICATION
10. Trust and Trust Models for the IoT
11. Trustable Fellowships of Self-Organizing “Things” and Their Software Representatives: An Emerging ArchitectureModel for IoT Security and Privacy
12. Preventing Unauthorized Access to Sensor Data
13. Authentication in IoT
SECTION IV: IOT DATA SECURITY
14. Computational Security for the IoT and Beyond
15. Privacy-Preserving Time Series Data Aggregation for Internet of Things
16. A Secure Path Generation Scheme for Real-Time Green Internet of Things
17. Security Protocols for IoT Access Networks
SECTION V: SOCIAL AWARENESS
18. A User-Centric Decentralised Governance Framework for Privacy and Trust in IoT
19. A Policy-Based Approach for Informed Consent in Internet of Things
20. Security and Impact of the Internet of Things (IoT) on Mobile Networks

Author Details
"Fei Hu" is currently a professor in the Department of Electrical and Computer Engineering at the University of Alabama, Tuscaloosa. He obtained his PhDs at Tongji University (Shanghai, China) in the field of signal processing (in 1999), and at Clarkson University (New York) in electrical and computer engineering (in 2002).




Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment