
Privacy Vulnerabilities and Data Security Challenges in the IoT
- 222 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Privacy Vulnerabilities and Data Security Challenges in the IoT
About this book
This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues.
This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT.
This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1 Applications of Industrial Internet of Things (IIoT)
1.1 Introduction
1.1.1 Internet of Things
1.1.2 Machine-To-Machine (M2M)
1.1.3 Emergence and Growth of IoT
Historical Journey of IoT
Year | Event |
1949 | Norman Joseph Woodland invents the barcode, which is patented in 1952 and is first used by supermarkets 20 years later. |
1955 | Edward O. Thorp creates the worldâs first wearable computer, whose only function is to predict roulette wheels. |
1967 | Hubert Upton develops an analog wearable computer. |
1969 | The first message is sent over ARPANET. |
1973 | Invented by Mario Cardullo, the RFID tag receives its first patent. |
1977 | C.C. Colins creates a product for the visually disabled, a wearable that transforms an image into a tactile grid on a vest. |
Early 1980s | Carnegie-Mellon Computer Science Department researchers install micro-switches in the Coke vending machine and connect them to a computer to make supervision easier. |
1990 | John Romkey comes up with a toaster connected to the internet. |
1990 | Olivetti invents a badge system to locate people. |
1993 | Thad Starner from MIT uses a heads-up display as a wearable. |
1993 | Steven Feiner, Blair MacIntyre, and DorĂ©e Seligmann invent KARMAâKnowledge-based Augmented Reality for Maintenance Assistance. |
1995 | GPS Satellite Network (version 1) is completed. |
1999 | An Automatic Identification Center is set up at MIT where objects are linked to the internet through the RFID tag. |
1999 | The term Internet of Things is first used by Kevin Ashton of MIT. |
2000 | LG designs the first âsmart fridgeâ. |
2003 | Publications like The Guardian, Scientific American, and Boston Globe mention the Internet of Things in their articles. |
2004 | US Defence uses IoT in their Savi Program, and Walmart starts using IoT in commercial retail. |
2005 | The Interaction Design Institute Ivrea (IDII) invents a small microcontroller to help their students in making their projects. |
2007 | The United Nationsâ International Telecommunications Union publishes a report on Internet of Things, saying âfrom anytime, anyplace connectivity for anyone, we will now have connectivity for anything. Connections will multiply and create an entirely new dynamic network of networksâan Internet of Thingsâ. |
1.1.4 Setting up an IoT Infrastructure
Table of contents
- Cover
- Half-Title
- Series
- Title
- Copyright
- Dedication
- Contents
- Preface
- Editors
- Contributors
- Chapter 1 Applications of Industrial Internet of Things (IIoT)
- Chapter 2 Biomedical Applications Using IoT
- Chapter 3 Emerging Technological Advances in Healthcare
- Chapter 4 The Internet of Things (IoT) and Contactless Payments: An Empirical Analysis of the Healthcare Industry
- Chapter 5 AI in Healthcare
- Chapter 6 Security Vulnerabilities in the IoT
- Chapter 7 Research on IoT Governance, Security, and Privacy Issues of Internet of Things
- Chapter 8 Recent Trends of IoT and Big Data in Research Problem-Solving
- Chapter 9 A Theoretical Context for CSF in Medical Software Next Release
- Chapter 10 Robotics and Machine Learning
- Chapter 11 Detecting Medical Reviews Using Sentiment Analysis
- Index