A Beginner's Guide to Internet of Things Security
Attacks, Applications, Authentication, and Fundamentals
Brij B. Gupta ; Aakanksha Tewari
- Vår pris
- 894,-
(Innbundet)
Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.
(Innbundet)
Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.
IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems.
The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security.
Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Acknowledgments
Authors
1 Evolution of Internet of Things (IoT): History, Forecasts, and Security
2 IoT Design, Standards, and Protocols
3 IoT's Integration with Other Technologies
4 Industrial Internet of Things (IIoT)
5 Trust and Privacy in IoT
6 Authentication Mechanisms for IoT Networks
7 Provable Security Models and Existing Protocols
8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment
References
Index
Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering at National Institute of Technology (NIT), Kurukshetra, India. Her research interest includes Computer Networks, Information Security, Cloud Computing, Phishing Detection, Internet of Things, RFID authentication and number theory and Cryptography. She has done her M. Tech. (Computer Engineering) from Department of Computer Engineering at National Institute of Technology (NIT), Kurukshetra, India. She has participated and won in various National Workshops and Poster presentations. Currently her research work is based on Security and privacy in IoT networks and mutual authentication of RFID tags.