
- 154 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Securing the Internet of Things
About this book
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.- Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures- Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks- Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT- Contributed material by Dr. Imed Romdhani
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- About the Authors
- Chapter 1. Introduction: Securing the Internet of Things
- Chapter 2. Security Architecture in the Internet of Things
- Chapter 3. Security and Vulnerability in the Internet of Things
- Chapter 4. IoT Node Authentication
- Chapter 5. Security Requirements in IoT Architecture
- Chapter 6. Security in Enabling Technologies
- Chapter 7. Existing Security Scheme for IoT
- Chapter 8. Security Concerns in Social IoT
- Chapter 9. Confidentiality and Security for IoT Based Healthcare
- Index