Secure Communication in Internet of Things
eBook - ePub

Secure Communication in Internet of Things

Emerging Technologies, Challenges, and Mitigation

  1. 338 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Secure Communication in Internet of Things

Emerging Technologies, Challenges, and Mitigation

About this book

The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.

Features:

  • Explores the new Internet of Things security challenges, threats, and future regulations to end-users
  • Presents authentication, authorization, and anonymization techniques in the Internet of Things
  • Illustrates security management through emerging technologies such as blockchain and artificial intelligence
  • Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
  • Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things

It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Secure Communication in Internet of Things by T. Kavitha,M.K. Sandhya,V.J. Subashini,Prasidh Srikanth in PDF and/or ePUB format, as well as other popular books in Computer Science & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover Page
  2. Half Title page
  3. Title Page
  4. Copyright Page
  5. Editorial Advisory Board and Reviewers
  6. Contents
  7. Preface
  8. Editors
  9. Contributors
  10. 1 Introduction to Internet of Things Security
  11. 2 IoT Hardware, Platform, and Security Protocols
  12. 3 Secure Device Management and Device Attestation in IoT
  13. 4 Secure Operating Systems and Software
  14. 5 Wireless Physical Layer Security
  15. 6 Lightweight Crypto Mechanisms and Key Management in IoT Scenario
  16. 7 Secure Data Collection, Aggregation, and Sharing in the Internet of Things
  17. 8 Authentication, Authorization, and Anonymization Techniques in the IoT
  18. 9 Secure Identity, Access, and Mobility Management in the Internet of Things
  19. 10 Privacy-Preserving Scheme for Internet of Things
  20. 11 Trust Establishment Models in IoT
  21. 12 Secure Communication Protocols for the IoT
  22. 13 Adaptive Security in the Internet of Things
  23. 14 Covert Communication Security Methods
  24. 15 Clean-Slate and Cross-Layer IoT Security Design
  25. 16 Edge Computing Technology for Secure IoT
  26. 17 Cloud Security for the IoT
  27. 18 IoT Security Using Blockchain
  28. 19 IoT Ecosystem-Level Security Auditing, Analysis, and Recovery
  29. 20 Risk Assessment and Vulnerability Analysis in the IoT
  30. 21 Threat Models and Attack Strategies in the Internet of Things
  31. 22 Security and Privacy Issues in IoT
  32. 23 Vulnerabilities in Internet of Things and Their Mitigation with SDN and Other Techniques
  33. 24 Intrusion and Malware Detection and Prevention Techniques in IoT
  34. 25 5G and 6G Security Issues and Countermeasures
  35. Index