![IoT Security Paradigms and Applications](https://img.perlego.com/book-covers/1695190/9781000172287_300_450.webp)
IoT Security Paradigms and Applications
Research and Practices
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath
- 338 Seiten
- English
- ePUB (handyfreundlich)
- Über iOS und Android verfügbar
IoT Security Paradigms and Applications
Research and Practices
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath
Über dieses Buch
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book
-
- Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain
-
- Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities
-
- Presents various competitive technologies of Blockchain, especially concerned with IoT security
-
- Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications
-
- Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
Häufig gestellte Fragen
Information
Inhaltsverzeichnis
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Editors
- List of Contributors
- Chapter 1 The Convergence of IoT with Big Data and Cloud Computing
- Chapter 2 Cybersecurity Management within the Internet of Things
- Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network
- Chapter 4 Machine Learning: Approach towards Security
- Chapter 5 Privacy Preservation with Machine Learning
- Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes
- Chapter 7 Intrusion Detection of SCADA System Using Machine Learning Techniques: A Study
- Chapter 8 Person Authentication Based on Biometric Traits Using Machine Learning Techniques
- Chapter 9 Data Security and Privacy through Text Steganography Approaches
- Chapter 10 IoT as a Means of Strengthening Individual Farmers' Position in Collaboration for Transformation to Sustainable Farming
- Chapter 11 Security in IoT HealthCare
- Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare Systems in Poland
- Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep Learning
- Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid ML Model and IoT
- Chapter 15 Securing Honey Supply Chain through Blockchain: An Implementation View
- Index