IoT Security Paradigms and Applications (e-bog) af -
Debnath, Narayan C. (redaktør)

IoT Security Paradigms and Applications e-bog

473,39 DKK (inkl. moms 591,74 DKK)
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security ...
E-bog 473,39 DKK
Forfattere Debnath, Narayan C. (redaktør)
Forlag CRC Press
Udgivet 7 oktober 2020
Længde 338 sider
Genrer THR
Sprog English
Format pdf
Beskyttelse LCP
ISBN 9781000172249
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this bookShowcases the basics of both IoT and various security paradigms supporting IoT, including BlockchainExplores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart citiesPresents various competitive technologies of Blockchain, especially concerned with IoT securityProvides insights into the taxonomy of challenges, issues, and research directions in IoT-based applicationsIncludes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment