A beginner's guide to Internet of things security: attacks, applications, authentication, and fundamentals
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-M347 DE-92 DE-863 DE-862 DE-91 |
Zusammenfassung: | A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781003001126 9781000038002 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046621820 | ||
003 | DE-604 | ||
005 | 20220905 | ||
007 | cr|uuu---uuuuu | ||
008 | 200310s2020 xx o|||| 00||| eng d | ||
020 | |a 9781003001126 |c Online |9 978-1-00-300112-6 | ||
020 | |a 9781000038002 |c Online |9 978-1-00-003800-2 | ||
024 | 7 | |a 10.1201/9781003001126 |2 doi | |
035 | |a (OCoLC)1145235847 | ||
035 | |a (DE-599)BVBBV046621820 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-92 |a DE-91G |a DE-863 |a DE-862 |a DE-M347 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 614f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Gupta, B. B. |e Verfasser |4 aut | |
245 | 1 | 0 | |a A beginner's guide to Internet of things security |b attacks, applications, authentication, and fundamentals |c B.B. Gupta, Aakanksha Tewari |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index | |
520 | |a A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Internet of things | |
650 | 7 | |a COMPUTERS / Networking / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Tewari, Aakanksha |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardback |z 978-0-367-43069-6 |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-7-TFC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032033523 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6027168 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003001126 |l DE-M347 |p ZDB-7-TFC |q FHM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003001126 |l DE-92 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003001126 |l DE-863 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003001126 |l DE-862 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003001126 |l DE-91 |p ZDB-7-TFC |q TUM_Einzelkauf |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 877556 |
---|---|
_version_ | 1819742238766268416 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Gupta, B. B. Tewari, Aakanksha |
author_facet | Gupta, B. B. Tewari, Aakanksha |
author_role | aut aut |
author_sort | Gupta, B. B. |
author_variant | b b g bb bbg a t at |
building | Verbundindex |
bvnumber | BV046621820 |
classification_rvk | ST 276 |
classification_tum | DAT 614f DAT 461f |
collection | ZDB-30-PQE ZDB-7-TFC |
contents | Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index |
ctrlnum | (OCoLC)1145235847 (DE-599)BVBBV046621820 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV046621820</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220905</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200310s2020 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003001126</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-00-300112-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000038002</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-00-003800-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003001126</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1145235847</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046621820</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, B. B.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A beginner's guide to Internet of things security</subfield><subfield code="b">attacks, applications, authentication, and fundamentals</subfield><subfield code="c">B.B. Gupta, Aakanksha Tewari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tewari, Aakanksha</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardback</subfield><subfield code="z">978-0-367-43069-6</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032033523</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6027168</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003001126</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">FHM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003001126</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003001126</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003001126</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003001126</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046621820 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:08:22Z |
indexdate | 2024-12-29T04:03:55Z |
institution | BVB |
isbn | 9781003001126 9781000038002 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032033523 |
oclc_num | 1145235847 |
open_access_boolean | |
owner | DE-1050 DE-92 DE-91G DE-BY-TUM DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-M347 |
owner_facet | DE-1050 DE-92 DE-91G DE-BY-TUM DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-M347 |
physical | 1 Online-Ressource |
psigel | ZDB-30-PQE ZDB-7-TFC ZDB-30-PQE FHD01_PQE_Kauf ZDB-7-TFC FHM_Einzelkauf ZDB-7-TFC TUM_Einzelkauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
spellingShingle | Gupta, B. B. Tewari, Aakanksha A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index Computer security Internet of things COMPUTERS / Networking / General bisacsh COMPUTERS / Security / General bisacsh Computer security fast Internet of things fast Datensicherung (DE-588)4011144-1 gnd Internet der Dinge (DE-588)7713781-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)7713781-4 |
title | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals |
title_auth | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals |
title_exact_search | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals |
title_exact_search_txtP | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals |
title_full | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals B.B. Gupta, Aakanksha Tewari |
title_fullStr | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals B.B. Gupta, Aakanksha Tewari |
title_full_unstemmed | A beginner's guide to Internet of things security attacks, applications, authentication, and fundamentals B.B. Gupta, Aakanksha Tewari |
title_short | A beginner's guide to Internet of things security |
title_sort | a beginner s guide to internet of things security attacks applications authentication and fundamentals |
title_sub | attacks, applications, authentication, and fundamentals |
topic | Computer security Internet of things COMPUTERS / Networking / General bisacsh COMPUTERS / Security / General bisacsh Computer security fast Internet of things fast Datensicherung (DE-588)4011144-1 gnd Internet der Dinge (DE-588)7713781-4 gnd |
topic_facet | Computer security Internet of things COMPUTERS / Networking / General COMPUTERS / Security / General Datensicherung Internet der Dinge |
work_keys_str_mv | AT guptabb abeginnersguidetointernetofthingssecurityattacksapplicationsauthenticationandfundamentals AT tewariaakanksha abeginnersguidetointernetofthingssecurityattacksapplicationsauthenticationandfundamentals |