Towards the Internet of Things : architectures, security, and applications /: architectures, security, and applications. ([2020])
- Record Type:
- Book
- Title:
- Towards the Internet of Things : architectures, security, and applications /: architectures, security, and applications. ([2020])
- Main Title:
- Towards the Internet of Things : architectures, security, and applications
- Further Information:
- Note: Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
- Authors:
- Jamali, Mohammad Ali Jabraeil
Bahrami, Bahareh
Heidari, Arash
Allahverdizadeh, Parisa
Norouzi, Farhad - Contents:
- Intro; Preface; Contents; Chapter 1: The IoT Landscape; 1 What Is IoT?; 2 Applications; 3 Architectures; 4 Security; 5 This Book; References; Chapter 2: IoT Architecture; 1 Introduction; 1.1 Three-and Five-Layer Architectures; 2 Survey on Domain-Specific Useful IoT Architectures; 2.1 RFID; Electronic Product Code Based IoT Architecture; 2.2 Service-Oriented Architecture (SOA); IoT Middleware Architecture; 2.3 Wireless Sensor Network (WSN); Agricultural Monitoring IoT Architecture; 2.4 IoT Architecture for Smart Cities; 2.5 IoT-Fog Architecture 2.6 IoT-Based Architecture for Healthcare Development2.7 Object-Based Security Architecture (OSCAR); 2.8 Cyber-Physical and Social Security Architecture; 2.9 Hierarchical Architecture of Security; 2.10 Media-Aware Traffic Security Architecture; 2.11 HIMMO-Based Security Architecture; 2.12 Security Architecture Based on IoTNetWar; 3 Conclusion; References; Chapter 3: IoT Security; 1 Introduction; 2 Backgrounds, Threats, and Attacks; 2.1 Why Security Is More Challenging in IoT?; 2.2 Background on Security Services; 2.3 Cryptography; Lightweight Cryptography; Symmetric Key Cryptography Asymmetric Key Cryptography2.4 The Architecture of Security; 2.5 Security Challenges and Issues; Perception Layer Challenges; Unauthorized Access to Tags; Node Capture Attacks; Tag Cloning; False Data Injection Attacks; Network Layer Challenges; Spoofing Attack; Sinkhole Attack; Sleep Deprivation Attack; Denial-of-Service (DoS) Attack; Unsecured Protocols;Intro; Preface; Contents; Chapter 1: The IoT Landscape; 1 What Is IoT?; 2 Applications; 3 Architectures; 4 Security; 5 This Book; References; Chapter 2: IoT Architecture; 1 Introduction; 1.1 Three-and Five-Layer Architectures; 2 Survey on Domain-Specific Useful IoT Architectures; 2.1 RFID; Electronic Product Code Based IoT Architecture; 2.2 Service-Oriented Architecture (SOA); IoT Middleware Architecture; 2.3 Wireless Sensor Network (WSN); Agricultural Monitoring IoT Architecture; 2.4 IoT Architecture for Smart Cities; 2.5 IoT-Fog Architecture 2.6 IoT-Based Architecture for Healthcare Development2.7 Object-Based Security Architecture (OSCAR); 2.8 Cyber-Physical and Social Security Architecture; 2.9 Hierarchical Architecture of Security; 2.10 Media-Aware Traffic Security Architecture; 2.11 HIMMO-Based Security Architecture; 2.12 Security Architecture Based on IoTNetWar; 3 Conclusion; References; Chapter 3: IoT Security; 1 Introduction; 2 Backgrounds, Threats, and Attacks; 2.1 Why Security Is More Challenging in IoT?; 2.2 Background on Security Services; 2.3 Cryptography; Lightweight Cryptography; Symmetric Key Cryptography Asymmetric Key Cryptography2.4 The Architecture of Security; 2.5 Security Challenges and Issues; Perception Layer Challenges; Unauthorized Access to Tags; Node Capture Attacks; Tag Cloning; False Data Injection Attacks; Network Layer Challenges; Spoofing Attack; Sinkhole Attack; Sleep Deprivation Attack; Denial-of-Service (DoS) Attack; Unsecured Protocols; Application Layer Challenges; Phishing Attack; Malicious Virus/Worm; Sniffing Attack; Malicious Scripts; Reverse Engineering; 2.6 Intrusion Detection System (IDS); Anomaly-Based; Signature-Based; Specification-Based; Hybrid 2.7 Security Features of IoTConfidentiality; Integrity; Availability; Identification and Authentication; Privacy; Trust; 3 IoT Applications and Security Needs; 3.1 Smart Home; 3.2 Smart Connected Health; 3.3 Smart Grid; 4 Overview of Privacy; 4.1 Privacy Preservation; 4.2 Data Collection; 4.3 Data Collection Policy; 4.4 Device Privacy; 4.5 Enhancing Privacy and Privacy Through Design Measures; 4.6 Information Privacy; 5 Trust and Authentication; 5.1 Trust; 5.2 Trust Properties and Objectives of Trust Management; 5.3 Trust Establishment; 5.4 Trust Evaluation; 5.5 User Trust; 5.6 Authentication Business AuthenticationLightweight Authentication; 5.7 IoT Authentication Architecture; 5.8 Access Control; 5.9 Less Security Preparation; 6 IoT Data Security; 6.1 The Architecture of IoT Data Security; 6.2 IoT's Data Security Technologies; 6.3 Data Minimization; 6.4 Firewall; 6.5 Forensics in IoT; Evidence Identification, Collection, and Preservation; Evidence Analysis and Correlation; Attack or Deficit Attribution; 6.6 IoT Security Using Machine Learning; 7 IoT Architectural Security Design; 7.1 Fog/Edge Computing-Based IoT; 7.2 End-to-End Things Security; 7.3 Edge Security Layer Service … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 004.678
Internet of things
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030184681
3030184684 - Related ISBNs:
- 9783030184674
- Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed June 17, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.432360
- Ingest File:
- 02_550.xml