Amazing technological breakthrough possible @S-Logix

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • +91- 81240 01111

Social List

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications - Research Book

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Best Research Book in Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Author(s) Name:  Ali Ismail Awad, Jemal Abawajy

About the Book:

   The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
   The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security.

Table of Contents

  • 1. Advanced Attacks and Protection Mechanisms in IoT Devices and Networks
  •   1.1: Introduction
      1.2: Physical Security in IoT Devices
      1.3: Remote Attestation in IoT Devices
  • 2. Human Aspects of IoT Security and Privacy
  •   2.1: An Overview of the Domestic IoT Environment
      2.2: Security Issues and the IoT Landscape
      2.3: Human Factors Challenges in IoT Security and Privacy
  • 3. Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks
  •   3.1: Data Exfiltration Types, Attack Mechanisms, and Defence Techniques
      3.2: A Defence Mechanism for Physical Data Exfiltration Mitigation
      3.3: Implementation and Analysis
  • 4. eSIM-Based Authentication Protocol for UAV Remote Identification
  •   4.1: Drone Security
      4.2: Drone Safety
      4.3: UAV Remote Identification
  • 5. Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges
  •   5.1 Introduction
      5.3: Recent Development of Collaborative Intrusion Detection
      5.4: Open Challenges and Future Trend
  • 6. Cyber-Securing IoT Infrastructure by Modeling Network Traffic
  •   6.1: Cyber-Attacks on IoT Infrastructure
      6.2: Network Behavioral Model of IoTs
  • 7. Integrity of IoT Network Flow Records in Encrypted Traffic Analytics
  •   7.1: Flow Based Telemetry
      7.2: Hashing-Based MAC for Telemetry Data
      7.3: Experimental Analysis
  • 8. Securing Contemporary eHealth Architectures: Techniques and Methods
  •   8.1: eHealth
      8.3: eHealth Threat Landscape
  • 9. Security and Privacy of Smart Homes: Issues and Solutions
  •   9.1: State-of-the-Art in Smart Homes’ Security and Privacy
      9.2: Privacy Techniques and Mechanisms
  • 10. IoT Hardware-Based Security: A Generalized Review of Threats and Countermeasures
  •   10.1: Hardware Attacks
      10.2: Physical Security Attacks Countermeasures
      10.3: Conclusion

    ISBN:  978-1-119-60774-8

    Publisher:  Wiley-IEEE Press

    Year of Publication:  2021

    Book Link:  Home Page Url