Amazing technological breakthrough possible @S-Logix

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • +91- 81240 01111

Social List

Internet of Things Security: Fundamentals, Techniques and Applications - Research Book

Internet of Things Security: Fundamentals, Techniques and Applications

Best Research Book in Internet of Things Security: Fundamentals, Techniques and Applications

Author(s) Name:  Shishir K. Shandilya, Soon Ae Chun, Smita Shandilya, Edgar Weippl

About the Book:

   Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design.
   To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them.
   Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field.

Technical topics discussed in the book include:

  • Machine-to-Machine Communications
  • IoT Architecture
  • Identity of Things
  • Block Chain
  • Parametric Cryptosystem
  • Software and Cloud Components

  • Table of Contents

  • 1. IoT Security: An Introduction
  • 2. Internet of Things Privacy, Security, and Governance
  • 3. IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment
  • 4. Safeguarding the Connected Future: Security in Internet of Things (IoT)
  • 5. Role of Blockchain in IoT Security
  • 6. Cryptic Mining for AVK-based IoT Cryptosystem and Client-side Encryption Perspective
  • ISBN:  9788793609532

    Publisher:  River Publishers

    Year of Publication:  2018

    Book Link:  Home Page Url