44,95 €
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
44,95 €
44,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
44,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: PDF

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be…mehr

Produktbeschreibung
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Sridipta Misra is a software engineer at Ericsson Canada. Currently working with the Authentication and Digital Identity development unit of Ericsson, he is engaged in research and development of security in cellular mobile computing systems. He completed his Master of Science degree from the School of Computer Science, at McGill University, Canada. As part of his thesis research, he investigated the security and privacy issues in the Internet of Things.

Muthucumaru Maheswaran is an associate professor in the School of Computer Science and the Department of Electrical and Computer Engineering at McGill University. He received a PhD in Electrical and Computer Engineering from Purdue University in 1998. He is carrying out research in the areas of cloud computing, Internet of Things, and social computing. In particular, he is interested in various aspects including security, privacy, and governance of Internet-scale distributed systems. He has published more than 120 papers andsupervised the completion of 7 PhD students and more than 35 MSc thesis students in research projects in the above areas.

Salman Hashmi is researcher in the Networks Lab in the School of Computer Science. He received a BSc degree in Electrical Engineering from McGill University. His research interests are in security and privacy of Internet of Things.

Rezensionen
"This book gives a well-organized survey on the security challenges and approaches in IoT. The contents include the system model, risk analysis, security mechanisms, and policy. Moreover, the authors also provide case studies of typical IoT applications such as vehicular ad hoc networks (VANETs), eHealth systems, and smart grids. ... This is a very good book for beginners in the area of IoT security. It is also a useful comprehensive study for IoT users, engineers, and managers." (Zheng Gong, Computing Reviews, March, 2017)