ORPP logo
Image from Google Jackets

Internet of Things Security : Principles, Applications, Attacks, and Countermeasures.

By: Contributor(s): Material type: TextTextPublisher: Milton : Taylor & Francis Group, 2020Copyright date: ©2020Edition: 1st edDescription: 1 online resource (115 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781000048452
Subject(s): Genre/Form: Additional physical formats: Print version:: Internet of Things SecurityLOC classification:
  • TK5105.8857 .G878 2020
Online resources:
Contents:
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References.
6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index.
Summary: This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References.

6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index.

This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.