Models, Algorithms, and Implementations
E-Book, Englisch, 604 Seiten
ISBN: 978-1-4987-2319-0
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.
The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Internet of Things (IoT) as Interconnection of Threats (IoT)
Na Jeyanthi
Attack, Defense, and Network Robustness of Internet of Things
Pin-Yu Chen
Sybil Attack Detection in Vehicular Networks
Bharat Jayaraman, M.K. Jinesh, and Krishnashree Achuthan
Malware Propagation and Control in Internet of Things
Shin-Ming Cheng, Pin-Yu Chen, and Kwang-Cheng Chen
Solution-Based Analysis of Attack Vectors on Smart Home Systems
Andreas Brauchli and Depeng Li
Privacy Preservation Data Dissemination
Miao Xu, Wenyuan Xu, and Jason M. O’Kane
Privacy Preservation for IoT Used in Smart Buildings
Nico Saputro, Ali I. Yurekli, Kemal Akkaya, and Arif Selcuk Uluagac
Social Features for Location Privacy Enhancement in Internet of Vehicles
Xumin Huang, Jiawen Kang, Rong Yu, and Xiang Chen
Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing
Wei Ren, Liangli Ma, and Yi Ren
Trust and Trust Models for the IoT
Michael Schukat, Pablo Cortijo, and Hugh Melvin
Self-Organizing "Things" and Their Software Representatives
Antonio Marcos Alberti, Edielson Prevato Frigieri, and Rodrigo da Rosa Righi
Preventing Unauthorized Access to Sensor Data
Liu Licai, Yin Lihua, Guo Yunchuan, and Fang Bingxing
Authentication in IoT
Hong Liu
Computational Security for the IoT and Beyond
Pavel Loskot
Privacy-Preserving Time Series Data Aggregation for Internet of Things
Rongxing Lu, Xiaodong Lin, Cheng Huang, and Haiyong Bao
Secure Path Generation Scheme for Real-Time Green Internet of Things
Yung-Feng Lu and Chin-Fu Kuo
Security Protocols for IoT Access Networks
Romeo Giuliano, Franco Mazzenga, Alessandro Neri, and Anna Maria Vegni
User-Centric Decentralized Governance Framework for Privacy and Trust in IoT
Jorge Bernal Bernabe, Jose Luis Hernandez, Mara Victoria Moreno, Antonio Skarmeta, Niklas Palaghias, Michele Nati, and Klaus Moessner
Policy-Based Approach for Informed Consent in Internet of Things
Ricardo Neisse, Bertrand Copigneaux Abdur Rahim Biswas, Ranga Rao Venkatesha Prasad, and Gianmarco Baldini
Security and Impact of the Internet of Things (IoT) on Mobile Networks
Roger Piqueras Jover