A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals, 1st Edition (Hardback) book cover

A Beginner’s Guide to Internet of Things Security

Attacks, Applications, Authentication, and Fundamentals, 1st Edition

By B. B. Gupta, Aakanksha Tewari

CRC Press

120 pages

Purchasing Options:$ = USD
Hardback: 9780367430696
pub: 2020-03-01
Available for pre-order. Item will ship after 1st March 2020
$70.00
x


FREE Standard Shipping!

Description

A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the IoT environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare and smart cities, necessitate security applications that can be applied to every domain with minimal cost.

IoT contains three layers: application layer, middleware layer and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses state-of-the-art authentication-based security schemes which can secure RFID tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems.

The open challenges and future research direction discussed in this book will help to further the academic researchers and industry professionals in the domain of security.

Table of Contents

1. Evolution of Internet of Things (IoT): History, Forecasts and Security. 2. IoT Design, Standards and Protocols. 3. IoT’s Integration with Other Technologies. 4. Industrial Internet of Things (IIoT). 5. Trust and Privacy in IoT. 6. Authentication Mechanisms for IoT Networks. 7. Provable Security Models and Existing Protocols. 8. A Mutual Authentication Protocols for IoT Devices Ensuring Strong Location Privacy. 9. Future Directions and Guidelines.

About the Authors

Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian Commonwealth Scholarship awarded by Government of Canada. He published more than 175 research papers in international journals and conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Interscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong Kong, Italy, Spain, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Interscience and executive editor of IJITCA, Interscience, respectively. He is also serving as reviewer for Journals of IEEE, Springer, Wiley, Taylor & Francis, etc. He is also serving as guest editor of various reputed Journals. He was also visiting researcher with University of Murcia (UMU), Spain, Deakin University, Australia and Yamaguchi University, Japan in 2018, 2017 and 2015, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes Information security, Cyber Security, Cloud Computing, Web security, Intrusion detection and Phishing.

Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering at National Institute of Technology (NIT), Kurukshetra, India. Her research interest includes Computer Networks, Information Security, Cloud Computing, Phishing Detection, Internet of Things, RFID authentication and number theory and Cryptography. She has done her M. Tech. (Computer Engineering) from Department of Computer Engineering at National Institute of Technology (NIT), Kurukshetra, India. She has participated and won in various National Workshops and Poster presentations. Currently her research work is based on Security and privacy in IoT networks and mutual authentication of RFID tags.

Subject Categories

BISAC Subject Codes/Headings:
COM032000
COMPUTERS / Information Technology
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General
TEC061000
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications