Security and Privacy in Internet of Things (IoTs)
Models, Algorithms, and Implementations
- Publisher's listprice GBP 44.99
-
21 493 Ft (20 470 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 4 299 Ft off)
- Discounted price 17 195 Ft (16 376 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
21 493 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 30 June 2020
- ISBN 9780367574925
- Binding Paperback
- No. of pages608 pages
- Size 234x156 mm
- Weight 1120 g
- Language English 75
Categories
Short description:
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it also has attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute thei
MoreLong description:
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?"
The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.
The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
MoreTable of Contents:
Internet of Things (IoT) as Interconnection of Threats (IoT). Attack, Defense, and Network Robustness of Internet of Things. Sybil Attack Detection in Vehicular Networks. Malware Propagation and Control in Internet of Things. Solution-Based Analysis of Attack Vectors on Smart Home Systems. Privacy Preservation Data Dissemination. Privacy Preservation for IoT Used in Smart Buildings. Social Features for Location Privacy Enhancement in Internet of Vehicles. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing. Trust and Trust Models for the IoT. Self-Organizing "Things" and Their Software Representatives. Preventing Unauthorized Access to Sensor Data. Authentication in IoT. Computational Security for the IoT and Beyond. Privacy-Preserving Time Series Data Aggregation for Internet of Things. Secure Path Generation Scheme for Real-Time Green Internet of Things. Security Protocols for IoT Access Networks. User-Centric Decentralized Governance Framework for Privacy and Trust in IoT. Policy-Based Approach for Informed Consent in Internet of Things. Security and Impact of the Internet of Things (IoT) on Mobile Networks.
More
Problems of Han Administration: Ancestral Rites, Weights and Measures, and the Means of Protest
52 258 HUF
48 078 HUF
Corporate Finance: Core Principles and Applications
34 870 HUF
31 383 HUF
Design for Six Sigma in Product and Service Development: Applications and Case Studies
A Lab of My Own
15 345 HUF
14 118 HUF