Privacy Vulnerabilities and Data Security Challenges in the IoT (e-bog) af -
Tran, Duc-Tan (redaktør)

Privacy Vulnerabilities and Data Security Challenges in the IoT e-bog

436,85 DKK (inkl. moms 546,06 DKK)
This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This edited book discusses the use of security engineering and privacy-by...
E-bog 436,85 DKK
Forfattere Tran, Duc-Tan (redaktør)
Forlag CRC Press
Udgivet 23 november 2020
Længde 220 sider
Genrer Industrial chemistry and manufacturing technologies
Sprog English
Format epub
Beskyttelse LCP
ISBN 9781000201666
This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT. This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.