Security Framework for The Internet of Things Applications

 
Edition number: 1
Publisher: CRC Press
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 59.99
Estimated price in HUF:
28 975 HUF (27 595 HUF + 5% VAT)
Why estimated?
 
Your price:

23 180 (22 076 HUF + 5% VAT )
discount is: 20% (approx 5 795 HUF off)
Discount is valid until: 30 June 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

 
  Piece(s)

 
Short description:

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.

Long description:

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection.


This book:



  • Presents a security framework model design named Behavioral Network Traffic Identification and Novelty Anomaly Detection for the IoT Infrastructures

  • Highlights recent advancements in machine learning, deep learning, and networking standards to boost Internet of Things security

  • Builds a near real-time solution for identifying Internet of Things devices connecting to a network using their network traffic traces and providing them with sufficient access privileges

  • Develops a robust framework for detecting IoT anomalous network traffic

  • Covers an anti-malware solution for detecting malware targeting embedded devices

It will serve as an ideal text for senior undergraduate and graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.

Table of Contents:

1. Introduction 2. Background and the State-Of-The-Art Security Solutions. 3. IoT Device Identification and Finger-printing. 4. Behavioural Novelty Detection for IoT Network Traffic. 5. Detection of Malware Targeting Embedded Devices. 6. Conclusion and Future Directions References