Internet of Things Security : Fundamentals, Techniques and Applications.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Aalborg :
River Publishers,
2018.
|
Colección: | River Publishers series in information science and technology.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1
- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT.
- 1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device.
- 1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2
- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05
- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution).
- 2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3
- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing.
- 3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security and Privacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4
- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption.