Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A beginner's guide to Internet of th...
~
Gupta, B. B., (1982-)
Linked to FindBook
Google Book
Amazon
博客來
A beginner's guide to Internet of things security = attacks, applications, authentication, and fundamentals /
Record Type:
Electronic resources : Monograph/item
Title/Author:
A beginner's guide to Internet of things security/ B.B. Gupta, Aakanksha Tewari.
Reminder of title:
attacks, applications, authentication, and fundamentals /
Author:
Gupta, B. B.,
other author:
Tewari, Aakanksha.
Published:
Boca Raton, FL :CRC Press, : c2020.,
Description:
1 online resource :ill.
[NT 15003449]:
Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index.
Subject:
Computer security. -
Online resource:
https://www.taylorfrancis.com/books/9781003001126
ISBN:
9781003001126
A beginner's guide to Internet of things security = attacks, applications, authentication, and fundamentals /
Gupta, B. B.,1982-
A beginner's guide to Internet of things security
attacks, applications, authentication, and fundamentals /[electronic resource] :B.B. Gupta, Aakanksha Tewari. - 1st ed. - Boca Raton, FL :CRC Press,c2020. - 1 online resource :ill.
Includes bibliographical references and index.
Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index.
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
ISBN: 9781003001126Subjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / G86 2020eb
Dewey Class. No.: 005.8
A beginner's guide to Internet of things security = attacks, applications, authentication, and fundamentals /
LDR
:03339cmm a2200349 a 4500
001
2416457
005
20251017072503.0
006
m o d
007
cr cnu---unuuu
008
260303s2020 flua ob 001 0 eng d
020
$a
9781003001126
$q
(electronic bk.)
020
$a
1003001122
$q
(electronic bk.)
020
$a
9781000038002
$q
(electronic bk. : EPUB)
020
$a
1000038009
$q
(electronic bk. : EPUB)
020
$a
9781000037982
$q
(electronic bk. : PDF)
020
$a
1000037983
$q
(electronic bk. : PDF)
020
$z
9780367430696
$q
(hardback)
035
$a
(OCoLC)1138019482
035
$a
(OCoLC-P)1138019482
035
$a
9781003001126
040
$a
OCoLC-P
$b
eng
$c
OCoLC-P
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
G86 2020eb
082
0 4
$a
005.8
$2
23
100
1
$a
Gupta, B. B.,
$d
1982-
$3
3795160
245
1 2
$a
A beginner's guide to Internet of things security
$h
[electronic resource] :
$b
attacks, applications, authentication, and fundamentals /
$c
B.B. Gupta, Aakanksha Tewari.
250
$a
1st ed.
260
$a
Boca Raton, FL :
$b
CRC Press,
$c
c2020.
300
$a
1 online resource :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Preface Acknowledgments Authors 1 Evolution of Internet of Things (IoT): History, Forecasts, and Security 2 IoT Design, Standards, and Protocols 3 IoT's Integration with Other Technologies 4 Industrial Internet of Things (IIoT) 5 Trust and Privacy in IoT 6 Authentication Mechanisms for IoT Networks 7 Provable Security Models and Existing Protocols 8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment References Index.
520
$a
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
588
$a
OCLC-licensed vendor bibliographic record.
650
0
$a
Computer security.
$3
540555
650
0
$a
Internet of things.
$3
2057703
700
1
$a
Tewari, Aakanksha.
$3
3795161
856
4 0
$u
https://www.taylorfrancis.com/books/9781003001126
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9521470
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 G86 2020eb
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login