Security and Privacy in the Internet of Things (eBook, PDF)
Redaktion: Rameem Zahra, Syed; Ahsan Chishti, Mohammad
46,95 €
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
46,95 €
Als Download kaufen
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
23 °P sammeln
Security and Privacy in the Internet of Things (eBook, PDF)
Redaktion: Rameem Zahra, Syed; Ahsan Chishti, Mohammad
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things. The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.8MB
Andere Kunden interessierten sich auch für
- Security and Privacy in the Internet of Things (eBook, ePUB)46,95 €
- From Visual Surveillance to Internet of Things (eBook, PDF)51,95 €
- Advanced Wireless Sensing Techniques for 5G Networks (eBook, PDF)52,95 €
- Soft Computing in Wireless Sensor Networks (eBook, PDF)52,95 €
- Information Security Handbook (eBook, PDF)47,95 €
- Peter Simon SapatySpatial Grasp as a Model for Space-based Control and Management Systems (eBook, PDF)58,95 €
- Internet of Things (eBook, PDF)48,95 €
-
-
-
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things. The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 214
- Erscheinungstermin: 15. Dezember 2020
- Englisch
- ISBN-13: 9781000286304
- Artikelnr.: 60576492
- Verlag: Taylor & Francis
- Seitenzahl: 214
- Erscheinungstermin: 15. Dezember 2020
- Englisch
- ISBN-13: 9781000286304
- Artikelnr.: 60576492
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Syed Rameem Zahra is currently pursuing her Doctor of Philosophy (Ph.D.) from National Institute of Technology Srinagar. She has earned the Bachelor of Technology (B. Tech.) degree in computer science and engineering (CSE) from the University of Kashmir, Srinagar, India, and the M.Tech. degree in computer science and engineering from SMVDU, Katra, India. She is a gold medalist at both graduate and post graduate levels. She has published more than ten research articles in reputed journals (indexed by Scopus and SCI) and conferences (indexed by Scopus). She has been facilitated with a Certificate of Appreciation by Ministry of Human Resource Development (Department of Higher Education), Government of India for her academic excellence. Her research areas include the Database systems, Wireless Sensor Networks (WSN), Vehicular Ad hoc Networks (VANET), and Internet of Things (IoT) Security. Dr. Mohammad Ahsan Chishti has earned his Doctor of Philosophy (Ph.D.) from National Institute of Technology Srinagar. He has earned Bachelor of Engineering (B.E.) and M.S. in computer and information engineering (MSCIE) from International Islamic University Malaysia. Presently he is Dean, School of Engineering & Technology, and Associate Professor in the Department of Information Technology, Central University of Kashmir. He has more than 70 research publications to his credit and 13 patents with two granted International Patents. He has successfully completed Department of Science & Technology sponsored research project. He has been awarded "IEI Young Engineers Award 2015-2016" in the field of Computer Engineering for the year 2015-16 by the Institution of Engineers (India) and "Young Scientist Award 2009-2010" from Department of Science & Technology, Government of Jammu and Kashmir for the year 2009-2010. He has been Executive Member, Institute of Engineers India (IEI) of J&K Chapter. He has been guiding Phd, Master of Technology (M.Tech) and Bachelor of Technology (B. Tech) research projects and his research area includes IoT, Computer Networks, Next Generation Networks, MPLS and Technology Roadmapping. He is Senior Member-Institute of Electrical and Electronics Engineers (IEEE) and Member of several other societies like IEI, CSI, IETE apart from being member of other technical societies.
Contents
Abbreviations................................................................................................................................
vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors..................................................................................................................................
xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of
Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security
Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power
Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the
IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in
IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT
Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based
Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT
Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics
.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles
......................................133
Surbhi Sharma and Baijnath Kaushik
11. "Alexa, What about LGPD?": The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants
...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing
Data
Aggregation Using Neural Network-Based
Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices...................................................................................................................................
187
Index..............................................................................................................................................
193
Abbreviations................................................................................................................................
vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors..................................................................................................................................
xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of
Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security
Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power
Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the
IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in
IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT
Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based
Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT
Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics
.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles
......................................133
Surbhi Sharma and Baijnath Kaushik
11. "Alexa, What about LGPD?": The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants
...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing
Data
Aggregation Using Neural Network-Based
Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices...................................................................................................................................
187
Index..............................................................................................................................................
193
Contents
Abbreviations................................................................................................................................
vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors..................................................................................................................................
xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of
Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security
Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power
Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the
IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in
IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT
Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based
Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT
Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics
.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles
......................................133
Surbhi Sharma and Baijnath Kaushik
11. "Alexa, What about LGPD?": The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants
...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing
Data
Aggregation Using Neural Network-Based
Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices...................................................................................................................................
187
Index..............................................................................................................................................
193
Abbreviations................................................................................................................................
vii
Preface...............................................................................................................................................ix
Editors...............................................................................................................................................xi
Contributors..................................................................................................................................
xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of
Things.....................1
Syed Rameem Zahra
2. Loopholes in IoT Security
Services....................................................................................17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power
Transfer................................................................................................................37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the
IoT.................................................................51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in
IoT..............................................................................................................67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT
Systems...............81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based
Applications................................................................................................................95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT
Security.................................................................................109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics
.........................................125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles
......................................133
Surbhi Sharma and Baijnath Kaushik
11. "Alexa, What about LGPD?": The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants
...........................................151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing
Data
Aggregation Using Neural Network-Based
Autoencoders.........................................171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices...................................................................................................................................
187
Index..............................................................................................................................................
193