TY - BOOK AU - Gupta,Brij B. AU - Quamara,Megha TI - Internet of Things Security: Principles, Applications, Attacks, and Countermeasures SN - 9781000048452 AV - TK5105.8857 .G878 2020 PY - 2020/// CY - Milton PB - Taylor & Francis Group KW - Internet of things-Security measures KW - Electronic books N1 - Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- Acknowledgments -- Authors -- 1: Internet of Things - Evolution, Statistics, and Forecasts -- 1.1 Introduction -- 1.2 Definition of IoT -- 1.3 Evolution -- 1.4 Related Statistics -- 1.5 Industrial Forecasts -- 1.5.1 General Forecasts -- 1.5.2 Security-Related Forecasts -- 1.6 Chapter Summary -- References -- 2: IoT Architecture and Business Models -- 2.1 Introduction -- 2.2 IoT Architecture -- 2.3 Business Models for IoT -- 2.3.1 What Are Business Models? -- 2.3.2 Components of Business Models -- 2.3.3 Challenges in Developing Business Model Frameworks for the IoT -- 2.3.4 IoT Business Models -- 2.3.5 Technological Perspective of Business Models -- 2.3.5.1 Industrial Context -- 2.3.5.2 Blockchain -- 2.3.5.3 5G -- 2.4 Chapter Summary -- References -- 3: Communication and Development Primitives in IoT -- 3.1 Introduction -- 3.2 Communication Protocols, Standards, and Regulations -- 3.2.1 Message Queuing Telemetry Transport -- 3.2.2 Constrained Application Protocol -- 3.3 Design and Development Tools -- 3.4 Datasets -- 3.5 Chapter Summary -- References -- 4: Challenges in IoT -- 4.1 Introduction -- 4.2 Challenges Associated with IoT Architecture -- 4.3 Challenges Associated with Entities -- 4.4 Technology-Oriented Challenges -- 4.5 Challenges Associated with Features -- 4.6 Challenges Associated with Development Practices -- 4.7 Summary -- References -- 5: Data Explosion in IoT -- 5.1 Introduction -- 5.2 Big Data Definition -- 5.3 Underlying Factors for Data Explosion in the IoT -- 5.4 Key Challenges Associated with Managing the Data Explosion in the IoT -- 5.5 Technological Support -- 5.5.1 Machine Learning -- 5.5.2 Artificial Intelligence -- 5.5.3 Intelligent Edge Processing -- 5.6 Summary -- References; 6: Computing Paradigms and Security Issues in Connected and Autonomous Driving Vehicles -- 6.1 Introduction -- 6.2 Connected and Autonomous Driving Vehicle - A Technical Background -- 6.2.1 Functional Blocks -- 6.2.2 Underlying Technologies -- 6.2.2.1 Radio Detection and Ranging -- 6.2.2.2 Light Detection and Ranging -- 6.2.2.3 Global Positioning System -- 6.2.2.4 Ultrasonic Sensors -- 6.2.2.5 Dedicated Short Range Communications -- 6.2.2.6 Cameras -- 6.2.2.7 Other Sensors -- 6.2.2.8 Mapping Technologies -- 6.2.2.9 Route Planning and Navigation Algorithms -- 6.2.3 Potential Benefits and Forecasts -- 6.3 Computing Paradigms -- 6.3.1 Artificial Intelligence -- 6.3.2 Vehicular Cloud Computing or Edge Computing -- 6.3.3 End-to-End Networking -- 6.4 Security Issues and Existing Countermeasures -- 6.4.1 Challenges and Countermeasures Associated with Computing Paradigms -- 6.4.1.1 Artificial Intelligence -- 6.4.1.2 Vehicular Cloud Computing -- 6.4.1.3 End-to-End Networking -- 6.4.2 Challenges and Countermeasures Associated with Participating Entities -- 6.4.2.1 Vehicles -- 6.4.2.2 Connection Infrastructure -- 6.4.2.3 Human Aspects -- 6.5 Ongoing Research Efforts -- 6.6 Open Research Challenges -- 6.6.1 Deployment and Operational Costs -- 6.6.2 Security -- 6.6.3 Privacy -- 6.6.4 Legal and Ethical Aspects -- 6.6.5 Validation and Testing -- 6.6.6 Standardization -- 6.6.7 Other Aspects -- 6.7 Summary -- References -- Index N2 - This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain UR - https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=6123158 ER -