Communication Technologies and Security Challenges in IoT
Author : Ajay Prasad
Publisher : Springer Nature
Page : 562 pages
File Size : 18,75 MB
Release :
Category :
ISBN : 9819700523
Author : Ajay Prasad
Publisher : Springer Nature
Page : 562 pages
File Size : 18,75 MB
Release :
Category :
ISBN : 9819700523
Author : Duc-Tan Tran
Publisher : CRC Press
Page : 0 pages
File Size : 18,72 MB
Release : 2024-10-04
Category : Computers
ISBN : 9780367561079
This book discusses the evolution of security and privacy issues in the Internet of things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in the industry can easily understand the IoT security and privacy issues.
Author : Chintan Patel
Publisher : CRC Press
Page : 257 pages
File Size : 40,25 MB
Release : 2018-09-05
Category : Computers
ISBN : 0429845723
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
Author : BK Tripathy
Publisher : CRC Press
Page : 334 pages
File Size : 46,69 MB
Release : 2017-10-10
Category : Technology & Engineering
ISBN : 1351980297
The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: • Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. • Discusses recent security and privacy studies and social behavior of human beings over IoT. • Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. • Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. • Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.
Author : Patel, Harshita
Publisher : IGI Global
Page : 275 pages
File Size : 43,80 MB
Release : 2020-09-18
Category : Computers
ISBN : 1799824160
Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.
Author : Shancang Li
Publisher : Syngress
Page : 156 pages
File Size : 38,8 MB
Release : 2017-01-11
Category : Computers
ISBN : 0128045051
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. - Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures - Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks - Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT - Contributed material by Dr. Imed Romdhani
Author : Mallick, Pradeep Kumar
Publisher : IGI Global
Page : 314 pages
File Size : 21,25 MB
Release : 2018-12-28
Category : Computers
ISBN : 1522557946
Though an individual can process a limitless amount of information, the human brain can only comprehend a small amount of data at a time. Using technology can improve the process and comprehension of information, but the technology must learn to behave more like a human brain to employ concepts like memory, learning, visualization ability, and decision making. Emerging Trends and Applications in Cognitive Computing is a fundamental scholarly source that provides empirical studies and theoretical analysis to show how learning methods can solve important application problems throughout various industries and explain how machine learning research is conducted. Including innovative research on topics such as deep neural networks, cyber-physical systems, and pattern recognition, this collection of research will benefit individuals such as IT professionals, academicians, students, researchers, and managers.
Author : Waleed Ejaz
Publisher : Springer
Page : 76 pages
File Size : 50,85 MB
Release : 2018-10-12
Category : Technology & Engineering
ISBN : 3319950371
This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security.
Author : Munir, Kashif
Publisher : IGI Global
Page : 234 pages
File Size : 30,13 MB
Release : 2018-12-07
Category : Computers
ISBN : 1522571507
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today’s technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Author : Management Association, Information Resources
Publisher : IGI Global
Page : 2188 pages
File Size : 15,37 MB
Release : 2021-04-23
Category : Computers
ISBN : 1799889556
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.