Internet of Things Vulnerabilities and Recovery Strategies

 
Edition number: 1
Publisher: Auerbach Publications
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 160.00
Estimated price in HUF:
77 280 HUF (73 600 HUF + 5% VAT)
Why estimated?
 
Your price:

61 824 (58 880 HUF + 5% VAT )
discount is: 20% (approx 15 456 HUF off)
Discount is valid until: 30 June 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Short description:

The book covers the prime requirements for a secure Internet of Things (IoT) setup. The book discusses security concerns of an IoT setup by uncovering the present challenges in standardization of data routing, data integrity, device supervision, IoT integration, information storage, IoT performance, and security solutions.

Long description:

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT?s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:



  • Data Routing

  • Data Integrity

  • Device Supervision

  • IoT Integration

  • Information Storage

  • IoT Performance

The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

Table of Contents:

1. The Internet of Things (IoT): A Cripple to Data Privacy and Security 2. Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3. Privacy Preservation in Cyber Physical Systems Using Entropy-Based Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic Methodologies 5. Security of IoT and Its Solutions 6. A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices 7. Managing and Securing Information Storage in Internet of Things 8. Mitigation of Internet of Things: Cloud Security Challenges by Using Adaptive Security Principles 9. IoT Security with Blockchain Technology in the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11. Internet of Things: Security and Privacy Issues in IoT and Its Solutions 12. The Dark Side of Internet of Things in E-Commerce: Uncovering the Misuse of Personal Information 13. Intrusion Detection in Home Automation in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems Performance Analysis 16. Privacy and Security Issues in Smart Homes in an IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home Automation