Security analytics for the internet of everything. ([2020])
- Record Type:
- Book
- Title:
- Security analytics for the internet of everything. ([2020])
- Main Title:
- Security analytics for the internet of everything
- Further Information:
- Note: Edited by Mohuiddin Ahmed, Abu S.S.M. Barkat Ullah, and Al-Sakib Khan Pathan.
- Editors:
- (Computer scientist), Ahmed, Mohiuddin
Abu Barkat, Abu
Pathan, Al-Sakib Khan - Contents:
- Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I: Emerging Security Trends -- 1 Critical Analysis of Blockchain For Internet of Everything -- 1.1 Introduction -- 1.1.1 Chapter Roadmap -- 1.2 Overview of IoT -- 1.2.1 Key Features of IoT -- 1.2.2 Layered Architecture of IoT -- 1.2.3 Difference between the Traditional Networks and IoT -- 1.2.4 Issues in Centralized IoT Model -- 1.3 Blockchain in IoT: Future of the Digital World -- 1.3.1 Blockchain-Based IoT Architecture 1.3.1.1 IoT Gateway-Blockchain -- 1.3.1.2 IoT-IoT -- 1.3.1.3 IoT-Blockchain -- 1.3.1.4 Hybrid -- 1.3.2 Security Issues -- 1.3.2.1 Security Issues in Centralized IoT Model -- 1.3.2.2 Potential Blockchain Solutions from Literature -- 1.3.3 Establishing Security and Privacy through Blockchain: A Case Study of Smart Home -- 1.4 Summary on Blockchain-IoT Integration -- 1.4.1 Challenges and Opportunities -- 1.4.1.1 Storage Capacity and Scalability -- 1.4.1.2 Security -- 1.4.1.3 Privacy -- 1.4.1.4 Consensus Protocol -- 1.4.1.5 Smart Contracts -- 1.4.1.6 Legal Issues -- 1.5 Chapter Summary -- References 2 Iot Blockchain Integration: A Security Perspective -- 2.1 Introduction -- 2.2 Chapter Roadmap -- 2.3 Emerging Trends In Iot -- 2.3.1 Edge And Fog Computing -- 2.3.2 Low-Power Wide Area Networks -- 2.3.3 5G Networks -- 2.3.4 Machine Learning And Artificial Intelligence -- 2.4 Blockchain Concepts -- 2.4.1 DigitalCover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I: Emerging Security Trends -- 1 Critical Analysis of Blockchain For Internet of Everything -- 1.1 Introduction -- 1.1.1 Chapter Roadmap -- 1.2 Overview of IoT -- 1.2.1 Key Features of IoT -- 1.2.2 Layered Architecture of IoT -- 1.2.3 Difference between the Traditional Networks and IoT -- 1.2.4 Issues in Centralized IoT Model -- 1.3 Blockchain in IoT: Future of the Digital World -- 1.3.1 Blockchain-Based IoT Architecture 1.3.1.1 IoT Gateway-Blockchain -- 1.3.1.2 IoT-IoT -- 1.3.1.3 IoT-Blockchain -- 1.3.1.4 Hybrid -- 1.3.2 Security Issues -- 1.3.2.1 Security Issues in Centralized IoT Model -- 1.3.2.2 Potential Blockchain Solutions from Literature -- 1.3.3 Establishing Security and Privacy through Blockchain: A Case Study of Smart Home -- 1.4 Summary on Blockchain-IoT Integration -- 1.4.1 Challenges and Opportunities -- 1.4.1.1 Storage Capacity and Scalability -- 1.4.1.2 Security -- 1.4.1.3 Privacy -- 1.4.1.4 Consensus Protocol -- 1.4.1.5 Smart Contracts -- 1.4.1.6 Legal Issues -- 1.5 Chapter Summary -- References 2 Iot Blockchain Integration: A Security Perspective -- 2.1 Introduction -- 2.2 Chapter Roadmap -- 2.3 Emerging Trends In Iot -- 2.3.1 Edge And Fog Computing -- 2.3.2 Low-Power Wide Area Networks -- 2.3.3 5G Networks -- 2.3.4 Machine Learning And Artificial Intelligence -- 2.4 Blockchain Concepts -- 2.4.1 Digital Signatures and Public-Key Cryptography -- 2.4.2 Blockchain Fundamentals -- 2.4.3 Directed Acylic Graph (Dag) -- 2.4.4 Consensus Algorithms -- 2.4.5 Zero-Knowledge Proofs -- 2.4.6 Confidential Transactions And Ring Signatures -- 2.4.7 Distributed Filesystems 2.4.8 Distributed Applications (Dapps) -- 2.5 Iot-Blockchain Promises -- 2.5.1 Blockchain Security Mechanisms -- 2.5.2 Security And Privacy Enhancing Use-Cases -- 2.6 Iot-Blockchain Integration -- 2.7 Iot-Blockchain Evaluation -- 2.7.1 Standardized Data Storage -- 2.7.2 Decentralized Data Marketplace -- 2.7.3 Attack Profile Vault -- 2.8 Conclusion -- Acknowledgement -- References -- 3 An Overview of The Dark Web -- 3.1 Introduction -- 3.1.1 What Is the Dark Web? -- 3.1.2 How Is the Dark Web Used? -- 3.1.3 Where Is the Dark Web Used? -- 3.1.4 Why Is It Important for Security? 3.2 Taxonomy of the Web -- 3.2.1 Clear Net or the Surface Web -- 3.2.2 Deep Web -- 3.2.3 Dark Web -- 3.3 Governance of the Dark Web -- 3.4 Future of the Dark Web -- 3.5 Conclusions -- References -- Section II: Cyber Governance -- 4 Cyber Security in The Public Sector: Awareness of Potential Risks Among Public Policy Executives -- 4.1 Introduction -- 4.2 Statement of the Problem -- 4.3 Significance and Scope of the Case Study -- 4.4 Review of the Literature -- 4.5 Method of Study -- 4.6 Cyber Security-Issues & Challenges -- 4.6.1 What is Cyber Security? -- 4.6.2 People, Processes, and Technology … (more)
- Publisher Details:
- Boca Raton, FL : CRC Press
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8
Internet of things -- Security measures
Computer security
Computer Security
Internet des objets -- Sécurité -- Mesures
Sécurité informatique
COMPUTERS -- Information Technology
COMPUTERS -- Networking -- General
COMPUTERS -- Security -- General
Computer security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781000766080
9781000765847
1000765849
9781000765960
1000765962
9781003010463
1003010466 - Related ISBNs:
- 100076608X
036744092X
9780367440923 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from digital title page (viewed on March 23, 2020). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.727128
- Ingest File:
- 14_051.xml