Internet of Things Security : Principles, Applications, Attacks, and Countermeasures.
Material type:
- text
- computer
- online resource
- 9781000048452
- TK5105.8857 .G878 2020
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References.
6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index.
This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.