home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

hu fei - security and privacy in internet of things (iots)

Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
136,98 €
NICEPRICE
130,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

CRC Press

Pubblicazione: 04/2016
Edizione: 1° edizione





Note Editore

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.




Sommario

Internet of Things (IoT) as Interconnection of Threats (IoT)Na JeyanthiAttack, Defense, and Network Robustness of Internet of ThingsPin-Yu ChenSybil Attack Detection in Vehicular NetworksBharat Jayaraman, M.K. Jinesh, and Krishnashree AchuthanMalware Propagation and Control in Internet of ThingsShin-Ming Cheng, Pin-Yu Chen, and Kwang-Cheng ChenSolution-Based Analysis of Attack Vectors on Smart Home SystemsAndreas Brauchli and Depeng LiPrivacy Preservation Data DisseminationMiao Xu, Wenyuan Xu, and Jason M. O’KanePrivacy Preservation for IoT Used in Smart BuildingsNico Saputro, Ali I. Yurekli, Kemal Akkaya, and Arif Selcuk UluagacSocial Features for Location Privacy Enhancement in Internet of VehiclesXumin Huang, Jiawen Kang, Rong Yu, and Xiang ChenLightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory SensingWei Ren, Liangli Ma, and Yi RenTrust and Trust Models for the IoTMichael Schukat, Pablo Cortijo, and Hugh MelvinSelf-Organizing "Things" and Their Software RepresentativesAntonio Marcos Alberti, Edielson Prevato Frigieri, and Rodrigo da Rosa RighiPreventing Unauthorized Access to Sensor DataLiu Licai, Yin Lihua, Guo Yunchuan, and Fang BingxingAuthentication in IoTHong LiuComputational Security for the IoT and BeyondPavel LoskotPrivacy-Preserving Time Series Data Aggregation for Internet of ThingsRongxing Lu, Xiaodong Lin, Cheng Huang, and Haiyong BaoSecure Path Generation Scheme for Real-Time Green Internet of ThingsYung-Feng Lu and Chin-Fu KuoSecurity Protocols for IoT Access NetworksRomeo Giuliano, Franco Mazzenga, Alessandro Neri, and Anna Maria VegniUser-Centric Decentralized Governance Framework for Privacy and Trust in IoTJorge Bernal Bernabe, Jose Luis Hernandez, Mara Victoria Moreno, Antonio Skarmeta, Niklas Palaghias, Michele Nati, and Klaus MoessnerPolicy-Based Approach for Informed Consent in Internet of ThingsRicardo Neisse, Bertrand Copigneaux Abdur Rahim Biswas, Ranga Rao Venkatesha Prasad, and Gianmarco BaldiniSecurity and Impact of the Internet of Things (IoT) on Mobile NetworksRoger Piqueras Jover




Autore

Fei Hu is a professor in the Department of Electrical and Computer Engineering at the University of Alabama, Tuscaloosa. He earned his PhDs at Tongji University, Shanghai, China, in the field of signal processing in 1999, and at Clarkson University, New York, in electrical and computer engineering in 2002. He has published over 200 journal/conference papers and books. Dr. Hu’s research has been supported by the U.S. National Science Foundation, Cisco, Sprint, and other sources. His research expertise may be summarized as 3S: security, signals, and sensors. Recently, he has focused on cyberphysical system security and medical security issues.










Altre Informazioni

ISBN:

9781498723183

Condizione: Nuovo
Dimensioni: 9.25 x 6.25 in Ø 2.10 lb
Formato: Copertina rigida
Illustration Notes:175 b/w images, 16 tables and 171 equations
Pagine Arabe: 584
Pagine Romane: xx


Dicono di noi