Internet of Things Vulnerabilities and Recovery Strategies
  1. 360 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT's broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:

  • Data Routing
  • Data Integrity
  • Device Supervision
  • IoT Integration
  • Information Storage
  • IoT Performance

The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Internet of Things Vulnerabilities and Recovery Strategies by Fahim Masoodi, Alwi Bamhdi, Majid Ahmad Charoo, Zubair Masoodi, Arif Lattoo, Gousiya Hussain, Fahim Masoodi,Alwi Bamhdi,Majid Ahmad Charoo,Zubair Masoodi,Arif Lattoo,Gousiya Hussain,Faheem Syeed Masoodi in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Half-Title Page
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. List of Contributors
  8. Chapter 1 The Internet of Things (IoT): A Cripple to Data Privacy and Security
  9. Chapter 2 Cyber-Physical Threat Intelligence for IoT Using Machine Learning
  10. Chapter 3 Privacy Preservation in Cyber Physical Systems Using Entropy-Based Techniques
  11. Chapter 4 Securing IoT Environment Using Bio-Inspired Meta-Heuristic Methodologies
  12. Chapter 5 Security of IoT and Its Solutions
  13. Chapter 6 A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices
  14. Chapter 7 Managing and Securing Information Storage in the Internet of Things
  15. Chapter 8 Mitigation of Internet of Things: Cloud Security Challenges by Using Adaptive Security Principles
  16. Chapter 9 IoT Security with Blockchain Technology in the Financial Sector
  17. Chapter 10 Self-Adaptive Cyber-Physical Systems in IoT
  18. Chapter 11 The Internet of Things (IoT): Security and Privacy Issues in IoT and Its Solutions
  19. Chapter 12 The Dark Side of Internet of Things in E-Commerce: Uncovering the Misuse of Personal Information
  20. Chapter 13 Intrusion Detection in Home Automation in IoT
  21. Chapter 14 IoT Performance Assessment
  22. Chapter 15 Case Studies on IoT Systems Performance Analysis
  23. Chapter 16 Privacy and Security Issues in Smart Homes in an IoT Environment
  24. Chapter 17 Enhancing Security: Detecting Intrusions in IoT-Based Home Automation
  25. Index