Beyond the Internet of Things : everything interconnected /: everything interconnected. ([2017])
- Record Type:
- Book
- Title:
- Beyond the Internet of Things : everything interconnected /: everything interconnected. ([2017])
- Main Title:
- Beyond the Internet of Things : everything interconnected
- Further Information:
- Note: Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors.
- Editors:
- Batalla, Jordi Mongay
Mastorakis, George, 1978-
Mavromoustakis, Constandinos X, 1974-
Pallis, Evangelos, 1971- - Contents:
- Introduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary. AcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties. 4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview ofIntroduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary. AcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties. 4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview of Internet of Things Security; 2.2 Security Goals for the Internet of Things; 2.2.1 Confidentiality; 2.2.2 Integrity; 2.2.3 Availability; 2.2.4 Authentication; 2.2.5 Access Control; 2.2.6 Non-repudiation; 2.2.7 Secure Booting. 2.2.8 Device Tampering Detection2.3 Where Internet of Things Security Becomes Delicate; 2.3.1 Challenges of Implementing Security for IoT; 2.3.2 Hardware Issues; 2.4 Size and Heterogeneity of Things; 2.4.1 Size of IoT; 2.4.2 Heterogeneity of the IoT; 2.5 Privacy Concerns in the Internet of Things; 3 Fundamental Internet of Things Security Issues; 3.1 Things Are not Designed with Security in Mind; 3.1.1 Testing the Security of IoT Devices; 3.2 Open Debugging Interfaces; 3.3 Inappropriate Network Configuration and Use of Default Passwords by Users. 3.4 Lack of Encryption of Critical Information Before Storage3.5 Current and Emerging IoT Cyber Threat Landscape; 3.5.1 Internet of Things Cyber Assets; 3.5.2 Vulnerabilities Associated with IoT Devices; 3.6 Overview of Internet of Things Threat Agents; 4 IoT Security Issues that Need Immediate Attention; 4.1 Efficient Lightweight Authentication Schemes for IoT; 4.2 Robust and Flexible Lightweight Cryptography; 4.3 Need for Efficient Key Revocation Schemes; 4.4 Need for Standardization of Security Solutions; 5 Conclusions; Acknowledgments; References; Technologies for Connecting Everything. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 004.67/8
Engineering
Internet of things
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Internet of things
Engineering
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Engineering Economics, Organization, Logistics, Marketing
Technology & Engineering -- General
Information retrieval
Engineering: general
Telecommunication
Engineering economy
Technology & Engineering -- Telecommunications
Communications engineering / telecommunications
Electronic books
Electronic book - Languages:
- English
- ISBNs:
- 9783319507583
3319507583
3319507567
9783319507569 - Related ISBNs:
- 9783319507569
- Notes:
- Note: Includes bibliographical references at the end of each chapters.
Note: Online resource; title from PDF title page (SpringerLink, viewed January 11, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.357208
- Ingest File:
- 01_318.xml