CHF130.80
Download est disponible immédiatement
SECURITY AND PRIVACY IN THE INTERNET OF THINGS
Provides the authoritative and up-to-date information required for securing IoT architecture and applications
The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things:
Discusses a broad range of IoT attacks and defense mechanisms
Examines IoT security and privacy protocols and approaches
Covers both the logical and physical security of IoT devices
Addresses IoT security through network traffic modeling
Describes privacy preserving techniques in smart cities
Explores current threat and vulnerability analyses
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
Auteur
ALI ISMAIL AWAD, PhD, is currently an Associate Professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He is also an Associate Professor with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden. He is an Associate Professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Qena, Egypt. He is also a Visiting Researcher at the University of Plymouth, United Kingdom. Dr. Awad is an Editorial Board Member of the Future Generation Computer Systems Journal, Computers & Security Journal, the Internet of Things, Engineering Cyber Physical Human Systems Journal, Health Information Science and Systems Journal, and IET Image Processing Journal. Dr. Awad is currently an IEEE senior member.
JEMAL H. ABAWAJY, PhD, is a full professor at Faculty of Science, Engineering and Built Environment, Deakin University, Australia. He is a Senior Member of IEEE Society; IEEE Technical Committee on Scalable Computing (TCSC); IEEE Technical Committee on Dependable Computing and Fault Tolerance and IEEE Communication Society. His leadership is extensive spanning industrial, academic and professional areas (e.g., IEEE Technical Committee on Scalable Computing, Academic Board, Faculty Board and Research Integrity Advisory Group). Professor Abawajy is currently the Director of the Distributing System Security (DSS).
Texte du rabat
Provides the authoritative and up-to-date information required for securing IoT architecture and applications
The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things:
Résumé
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things:
Contenu
About the Editors xiii
List of Contributors xv
Preface xix
1 Advanced Attacks and Protection Mechanisms in IoT Devices and Networks 1
*Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, and Ahmad-Reza Sadeghi*
1.1 Introduction 2
1.2 Physical Security in IoT Devices 3
1.2.1 Physical Attacks 3
1.2.1.1 Side-channel Analysis Attacks 3
1.2.1.2 Fault Analysis Attacks 4
1.2.2 Profiling Attacks 4
1.2.3 Machine Learning and SCA 5
1.2.4 Real-world Attacks 7
1.2.5 Countermeasures 8
1.3 Remote Attestation in IoT Devices 9
1.3.1 Types of Remote Attestation 10
1.3.1.1 Software-based Remote Attestation 10
1.3.1.2 Hardware-based Remote Attestation 11
1.3.1.3 Hybrid Architecture-based Remote Attestation 12
1.3.2 Remote Attestation for Large IoT Networks 12
1.3.2.1 Classical S…