
Secure Communication in Internet of Things
Emerging Technologies, Challenges, and Mitigation
- 338 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Secure Communication in Internet of Things
Emerging Technologies, Challenges, and Mitigation
About this book
The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.
Features:
- Explores the new Internet of Things security challenges, threats, and future regulations to end-users
- Presents authentication, authorization, and anonymization techniques in the Internet of Things
- Illustrates security management through emerging technologies such as blockchain and artificial intelligence
- Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
- Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things
It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half Title page
- Title Page
- Copyright Page
- Editorial Advisory Board and Reviewers
- Contents
- Preface
- Editors
- Contributors
- 1 Introduction to Internet of Things Security
- 2 IoT Hardware, Platform, and Security Protocols
- 3 Secure Device Management and Device Attestation in IoT
- 4 Secure Operating Systems and Software
- 5 Wireless Physical Layer Security
- 6 Lightweight Crypto Mechanisms and Key Management in IoT Scenario
- 7 Secure Data Collection, Aggregation, and Sharing in the Internet of Things
- 8 Authentication, Authorization, and Anonymization Techniques in the IoT
- 9 Secure Identity, Access, and Mobility Management in the Internet of Things
- 10 Privacy-Preserving Scheme for Internet of Things
- 11 Trust Establishment Models in IoT
- 12 Secure Communication Protocols for the IoT
- 13 Adaptive Security in the Internet of Things
- 14 Covert Communication Security Methods
- 15 Clean-Slate and Cross-Layer IoT Security Design
- 16 Edge Computing Technology for Secure IoT
- 17 Cloud Security for the IoT
- 18 IoT Security Using Blockchain
- 19 IoT Ecosystem-Level Security Auditing, Analysis, and Recovery
- 20 Risk Assessment and Vulnerability Analysis in the IoT
- 21 Threat Models and Attack Strategies in the Internet of Things
- 22 Security and Privacy Issues in IoT
- 23 Vulnerabilities in Internet of Things and Their Mitigation with SDN and Other Techniques
- 24 Intrusion and Malware Detection and Prevention Techniques in IoT
- 25 5G and 6G Security Issues and Countermeasures
- Index