Ubiquitous computing and computing security of IoT. ([2019])
- Record Type:
- Book
- Title:
- Ubiquitous computing and computing security of IoT. ([2019])
- Main Title:
- Ubiquitous computing and computing security of IoT
- Further Information:
- Note: N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
- Editors:
- Jeyanthi, N
Abraham, Ajith, 1968-
Mcheick, Hamid - Contents:
- Intro; Contents; Security Protocols for IoT; 1 IoT Introduction and Security Overview; 2 IoT Security Requirements; 3 IoT Security Issues; 4 IoT Security Challenges; 4.1 IoT Hardware; 4.2 IoT Software and Firmware; 4.3 Insecure Network Communication; 4.4 Data Leaks from Cloud; 4.5 Threats and Attack Vectors; 5 IoT Protocol Architecture; 6 IoT Security Attacks; 6.1 Attacks on Firmware; 6.2 Attacks on Data; 6.3 TELNET Based Attacks; 6.4 DDOS Attack; 6.5 roBOT + NETwork (BOTNET); 6.6 Malware; 7 IoT Security Solutions; 7.1 Transport Layer Solutions; 7.2 Application Layer Solutions. 7.3 Network Layer SolutionsReferences; Security of Big Data in Internet of Things; 1 Introduction; 2 Introduction to Internet of Things and Big Data; 2.1 Internet of Things; 2.2 Big Data; 2.3 Big Data Analytics; 2.4 Relationship Between Big Data Analytics and IoT; 2.5 Architecture of IoT for Big Data Analytics; 3 Privacy of Big IoT Data; 3.1 Big Data Privacy at Data Generation Phase; 3.2 Big Data Privacy at Data Storage Phase; 3.3 Privacy Preservation Approaches for Cloud Storage; 3.4 Verification of Integrity of Data in Big Data Storage; 3.5 Privacy Preserving of Big Data in Data Processing. 4 A Secure Mechanism for Big Data Collection on Internet of Vehicles4.1 Initialization Phase; 4.2 First Time Log-on; 4.3 Once Again Log-on; 4.4 Collecting Data Securely; 4.5 Data Storage Security; 5 Providing Security to Big Sensing Data Streams Using Dynamic Prime Number Based Security Verification; 5.1 SecurityIntro; Contents; Security Protocols for IoT; 1 IoT Introduction and Security Overview; 2 IoT Security Requirements; 3 IoT Security Issues; 4 IoT Security Challenges; 4.1 IoT Hardware; 4.2 IoT Software and Firmware; 4.3 Insecure Network Communication; 4.4 Data Leaks from Cloud; 4.5 Threats and Attack Vectors; 5 IoT Protocol Architecture; 6 IoT Security Attacks; 6.1 Attacks on Firmware; 6.2 Attacks on Data; 6.3 TELNET Based Attacks; 6.4 DDOS Attack; 6.5 roBOT + NETwork (BOTNET); 6.6 Malware; 7 IoT Security Solutions; 7.1 Transport Layer Solutions; 7.2 Application Layer Solutions. 7.3 Network Layer SolutionsReferences; Security of Big Data in Internet of Things; 1 Introduction; 2 Introduction to Internet of Things and Big Data; 2.1 Internet of Things; 2.2 Big Data; 2.3 Big Data Analytics; 2.4 Relationship Between Big Data Analytics and IoT; 2.5 Architecture of IoT for Big Data Analytics; 3 Privacy of Big IoT Data; 3.1 Big Data Privacy at Data Generation Phase; 3.2 Big Data Privacy at Data Storage Phase; 3.3 Privacy Preservation Approaches for Cloud Storage; 3.4 Verification of Integrity of Data in Big Data Storage; 3.5 Privacy Preserving of Big Data in Data Processing. 4 A Secure Mechanism for Big Data Collection on Internet of Vehicles4.1 Initialization Phase; 4.2 First Time Log-on; 4.3 Once Again Log-on; 4.4 Collecting Data Securely; 4.5 Data Storage Security; 5 Providing Security to Big Sensing Data Streams Using Dynamic Prime Number Based Security Verification; 5.1 Security Verification of Data Streams; 5.2 Architecture of Secure Data Stream; 5.3 Purpose of Symmetric Key Cryptography; 5.4 Setup of DPBSV System; 5.5 Handshaking of DPBSV; 5.6 Security Verification of DPBSV; 6 Conclusion; References. IoT for Ubiquitous Learning Applications: Current Trends and Future Prospects1 Introduction; 2 Previous Work on Ubiquitous Learning Applications; 2.1 Early Attempts at Ubiquitous Learning Environments; 2.2 The Introduction of Passive Sensors to Ubiquitous Learning; 2.3 IoT-Assisted Ubiquitous Learning; 3 The Generic IoT Architecture; 4 Ubiquitous Learning Applications Mapped to the IoT Architecture; 5 Future Prospects and Recommendations; 6 Conclusion; References; Trust Management Approaches in Mobile Adhoc Networks; 1 Introduction; 2 Literature Review. 3 TDQM-Trust Scheme for Discovering and Quarantine the Misbehaviors in MANET3.1 Energy Auditor; 3.2 Direct Trust Monitor; 3.3 Indirect Trust Monitor; 3.4 Packet Modification Auditor; 3.5 Trust Aggregator; 3.6 Certificate Authority; 3.7 Trust Categorization Using Fuzzy; 3.8 CA Issuing Certificates; 3.9 Malicious Node Detection; 4 Simulation Results and Discussion; 5 CEBTM-Context Residual Energy Based Trust Management in MANET Network; 5.1 Context Data Manager; 5.2 Trust Manager; 5.3 Fuzzy Analysis; 5.4 Trust Monitor; 5.5 Echo Agent; 5.6 Simulation Results and Discussion. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource
- Subjects:
- 004.67/8
Internet of things -- Security measures
Ubiquitous computing
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Ubiquitous computing
Electronic books - Languages:
- English
- ISBNs:
- 9783030015664
3030015661 - Related ISBNs:
- 9783030015657
3030015653 - Notes:
- Note: Includes bibliographical references.
Note: Description based on online resource; title from digital title page (viewed on February 14, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.336037
- Ingest File:
- 02_335.xml