Secure Communication in Internet of Things
eBook - ePub

Secure Communication in Internet of Things

Emerging Technologies, Challenges, and Mitigation

T. Kavitha,M.K. Sandhya,V.J. Subashini,Prasidh Srikanth

  1. 338 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Secure Communication in Internet of Things

Emerging Technologies, Challenges, and Mitigation

T. Kavitha,M.K. Sandhya,V.J. Subashini,Prasidh Srikanth

Book details
Table of contents
Citations

About This Book

The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.

Features:

  • Explores the new Internet of Things security challenges, threats, and future regulations to end-users
  • Presents authentication, authorization, and anonymization techniques in the Internet of Things
  • Illustrates security management through emerging technologies such as blockchain and artificial intelligence
  • Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
  • Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things

It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Secure Communication in Internet of Things by T. Kavitha,M.K. Sandhya,V.J. Subashini,Prasidh Srikanth in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Engineering. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2024
ISBN
9781040025147
Edition
1

Table of contents

  1. Cover Page
  2. Half Title page
  3. Title Page
  4. Copyright Page
  5. Editorial Advisory Board and Reviewers
  6. Contents
  7. Preface
  8. Editors
  9. Contributors
  10. 1 Introduction to Internet of Things Security
  11. 2 IoT Hardware, Platform, and Security Protocols
  12. 3 Secure Device Management and Device Attestation in IoT
  13. 4 Secure Operating Systems and Software
  14. 5 Wireless Physical Layer Security
  15. 6 Lightweight Crypto Mechanisms and Key Management in IoT Scenario
  16. 7 Secure Data Collection, Aggregation, and Sharing in the Internet of Things
  17. 8 Authentication, Authorization, and Anonymization Techniques in the IoT
  18. 9 Secure Identity, Access, and Mobility Management in the Internet of Things
  19. 10 Privacy-Preserving Scheme for Internet of Things
  20. 11 Trust Establishment Models in IoT
  21. 12 Secure Communication Protocols for the IoT
  22. 13 Adaptive Security in the Internet of Things
  23. 14 Covert Communication Security Methods
  24. 15 Clean-Slate and Cross-Layer IoT Security Design
  25. 16 Edge Computing Technology for Secure IoT
  26. 17 Cloud Security for the IoT
  27. 18 IoT Security Using Blockchain
  28. 19 IoT Ecosystem-Level Security Auditing, Analysis, and Recovery
  29. 20 Risk Assessment and Vulnerability Analysis in the IoT
  30. 21 Threat Models and Attack Strategies in the Internet of Things
  31. 22 Security and Privacy Issues in IoT
  32. 23 Vulnerabilities in Internet of Things and Their Mitigation with SDN and Other Techniques
  33. 24 Intrusion and Malware Detection and Prevention Techniques in IoT
  34. 25 5G and 6G Security Issues and Countermeasures
  35. Index