2.6 IoT-Based Architecture for Healthcare Development2.7 Object-Based Security Architecture (OSCAR); 2.8 Cyber-Physical and Social Security Architecture; 2.9 Hierarchical Architecture of Security; 2.10 Media-Aware Traffic Security Architecture; 2.11 HIMMO-Based Security Architecture; 2.12 Security Architecture Based on IoTNetWar; 3 Conclusion; References; Chapter 3: IoT Security; 1 Introduction; 2 Backgrounds, Threats, and Attacks; 2.1 Why Security Is More Challenging in IoT?; 2.2 Background on Security Services; 2.3 Cryptography; Lightweight Cryptography; Symmetric Key Cryptography
متن يادداشت
2.7 Security Features of IoTConfidentiality; Integrity; Availability; Identification and Authentication; Privacy; Trust; 3 IoT Applications and Security Needs; 3.1 Smart Home; 3.2 Smart Connected Health; 3.3 Smart Grid; 4 Overview of Privacy; 4.1 Privacy Preservation; 4.2 Data Collection; 4.3 Data Collection Policy; 4.4 Device Privacy; 4.5 Enhancing Privacy and Privacy Through Design Measures; 4.6 Information Privacy; 5 Trust and Authentication; 5.1 Trust; 5.2 Trust Properties and Objectives of Trust Management; 5.3 Trust Establishment; 5.4 Trust Evaluation; 5.5 User Trust; 5.6 Authentication
متن يادداشت
Asymmetric Key Cryptography2.4 The Architecture of Security; 2.5 Security Challenges and Issues; Perception Layer Challenges; Unauthorized Access to Tags; Node Capture Attacks; Tag Cloning; False Data Injection Attacks; Network Layer Challenges; Spoofing Attack; Sinkhole Attack; Sleep Deprivation Attack; Denial-of-Service (DoS) Attack; Unsecured Protocols; Application Layer Challenges; Phishing Attack; Malicious Virus/Worm; Sniffing Attack; Malicious Scripts; Reverse Engineering; 2.6 Intrusion Detection System (IDS); Anomaly-Based; Signature-Based; Specification-Based; Hybrid
متن يادداشت
Business AuthenticationLightweight Authentication; 5.7 IoT Authentication Architecture; 5.8 Access Control; 5.9 Less Security Preparation; 6 IoT Data Security; 6.1 The Architecture of IoT Data Security; 6.2 IoT's Data Security Technologies; 6.3 Data Minimization; 6.4 Firewall; 6.5 Forensics in IoT; Evidence Identification, Collection, and Preservation; Evidence Analysis and Correlation; Attack or Deficit Attribution; 6.6 IoT Security Using Machine Learning; 7 IoT Architectural Security Design; 7.1 Fog/Edge Computing-Based IoT; 7.2 End-to-End Things Security; 7.3 Edge Security Layer Service
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9783030184681
ویراست دیگر از اثر در قالب دیگر رسانه
شماره استاندارد بين المللي کتاب و موسيقي
9783030184674
شماره استاندارد بين المللي کتاب و موسيقي
9783030184698
شماره استاندارد بين المللي کتاب و موسيقي
9783030184704
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Internet of things.
موضوع مستند نشده
COMPUTERS-- Computer Literacy.
موضوع مستند نشده
COMPUTERS-- Computer Science.
موضوع مستند نشده
COMPUTERS-- Data Processing.
موضوع مستند نشده
COMPUTERS-- Hardware-- General.
موضوع مستند نشده
COMPUTERS-- Information Technology.
موضوع مستند نشده
COMPUTERS-- Machine Theory.
موضوع مستند نشده
COMPUTERS-- Reference.
موضوع مستند نشده
Internet of things.
مقوله موضوعی
موضوع مستند نشده
COM-- 013000
موضوع مستند نشده
COM-- 014000
موضوع مستند نشده
COM-- 018000
موضوع مستند نشده
COM-- 032000
موضوع مستند نشده
COM-- 037000
موضوع مستند نشده
COM-- 052000
موضوع مستند نشده
COM-- 067000
موضوع مستند نشده
TJK
موضوع مستند نشده
TJK
رده بندی ديویی
شماره
004
.
678
ويراست
23
رده بندی کنگره
شماره رده
TK5105
.
8857
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )