
Internet of Things Security and Privacy
Practical and Management Perspectives
- 238 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Internet of Things Security and Privacy
Practical and Management Perspectives
About this book
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems.
The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Editors
- Contributors
- Chapter 1 Cybersecurity Risk Assessment in Advanced Metering Infrastructure
- Chapter 2 A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices
- Chapter 3 A Physical-Layer Approach for IoT Information Security During Interference Attacks
- Chapter 4 Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure
- Chapter 5 A Privacy-Sensitive, Situation-Aware Description Model for IoT
- Chapter 6 Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks
- Chapter 7 A Game-Theoretic Approach to Information Availability in IoT Networks
- Chapter 8 Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems
- Chapter 9 Privacy-Preserving Analytics of IoT Data Using Generative Models
- Index