Internet of Things Security : Principles, Applications, Attacks, and Countermeasures.
Gupta, Brij B.
Internet of Things Security : Principles, Applications, Attacks, and Countermeasures. - 1st ed. - 1 online resource (115 pages)
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References. 6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index.
This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
9781000048452
Internet of things-Security measures.
Electronic books.
TK5105.8857 / .G878 2020
Internet of Things Security : Principles, Applications, Attacks, and Countermeasures. - 1st ed. - 1 online resource (115 pages)
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References. 6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index.
This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
9781000048452
Internet of things-Security measures.
Electronic books.
TK5105.8857 / .G878 2020