Internet of Things Security and Privacy
eBook - ePub

Internet of Things Security and Privacy

Practical and Management Perspectives

  1. 238 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Internet of Things Security and Privacy

Practical and Management Perspectives

About this book

The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems.

The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Internet of Things Security and Privacy by Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak, Ali Ismail Awad,Atif Ahmad,Kim-Kwang Raymond Choo,Saqib Hakak in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. Editors
  8. Contributors
  9. Chapter 1 Cybersecurity Risk Assessment in Advanced Metering Infrastructure
  10. Chapter 2 A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices
  11. Chapter 3 A Physical-Layer Approach for IoT Information Security During Interference Attacks
  12. Chapter 4 Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure
  13. Chapter 5 A Privacy-Sensitive, Situation-Aware Description Model for IoT
  14. Chapter 6 Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks
  15. Chapter 7 A Game-Theoretic Approach to Information Availability in IoT Networks
  16. Chapter 8 Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems
  17. Chapter 9 Privacy-Preserving Analytics of IoT Data Using Generative Models
  18. Index