Description
Securing the Internet of Things
Authors: Li Shancang, Xu Li Da
Language: EnglishSubjects for Securing the Internet of Things:
Keywords
Access control list (ACL); Application-interface layer; Authentication; Authorization; Cloud; Context-aware access control; Cryptographic algorithms; Cryptography; Cryptography primitives; Cybersecurity; Data security; Datagram transport layer security (DTLS); Digital signatures; E-health; Enabling technologies; Healthcare; Identity-based authentication; Internet of Things (IoT); Internet of Things (IoT) hardware security; Internet of things (IoT); Internet of things (IoT) life cycle; Internet of things (IoT) nodes; Internet protocol (IP) connectivity; Kerckhoff's principle; Key management protocols; Machine-to-machine (M2M) gateway; Network layer; Nonce; Open standard for authorization (OAuth); OpenID; Ownership object relationship (OOR); Parental object relationship (POR); Privacy; Public-key encryption; Radio-frequency identification (RFID); Random numbers; Secret key; Secure sockets layer (SSL); Security; Sensing layer; Sequence numbers; Service layer; Smart home devices; Social Internet of Things (SIoT); Social networks; Timestamps; Tracking technologies; Transport encryption; Transport layer security (TLS); Wireless sensor network (WSN)
51.74 €
In Print (Delivery period: 14 days).
Add to cart the print on demand of Li Shancang, Xu Li DaSupport: Print on demand
Description
/li>Contents
/li>Biography
/li>Comment
/li>
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
1. Introduction: Securing the Internet of Things 2. Security Architecture in the Internet of Things 3. Security and Vulnerability in the Internet of Things 4. IoT Node Authentication 5. Security Requirements in IoT Architecture 6. Security in Enabling Technologies 7. Existing Security Scheme for IoT 8. Security Concerns in Social IoT 9. Confidentiality and Security for IoT Based Healthcare
Li Da Xu is an IEEE Fellow and an academician of Russian Academy of Engineering. He is affiliated with Old Dominion University, Norfolk, Virginia, USA
- Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
- Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks
- Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT
- Contributed material by Dr. Imed Romdhani