
Security of Internet of Things Nodes
Challenges, Attacks, and Countermeasures
- 320 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Security of Internet of Things Nodes
Challenges, Attacks, and Countermeasures
About this book
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
1
1.1 Introduction

Typical attack and protection scenario for IoT devices.
1.2 Discussion on Contemporary Structural Obfuscation Approaches used for Securing DSP Hardware/Coprocessor
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- About the Editors
- 1 Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms
- 2 Multi-bit True Random Number Generator for IoT Devices using Memristor
- 3 Secured Testing of AES Cryptographic ICs for IoT Devices
- 4 Biometric-based Secure Authentication for IoT-enabled Devices and Applications
- 5 An Improved Verification Scheme Based on User Biometrics
- 6 Obfuscation to Mitigate Hardware Attacks in Edge Nodes of IoT System
- 7 Lightweight Security Solutions for IoT using Physical-Layer-Key Generation
- 8 Threat and Attack Models in IoT Devices
- 9 Review on Hardware Attacks and Security Challenges in IoT Edge Nodes
- 10 Study of Hardware Attacks on Smart System Design Lab
- 11 A Novel Threat Modeling and Attack Analysis for IoT Applications
- 12 Trust Management in Internet-of-Things Devices
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app