Internet of Things Security : Principles, Applications, Attacks, and Countermeasures book cover
SAVE
$13.99
1st Edition

Internet of Things Security
Principles, Applications, Attacks, and Countermeasures




ISBN 9780367373962
Published March 4, 2020 by CRC Press
114 Pages 25 B/W Illustrations

 
SAVE ~ $13.99
was $69.95
USD $55.96

Prices & shipping based on shipping country


Preview

Book Description

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept.

Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field.

Key features:

  • Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies
  • Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements
  • Vision of exciting areas for future research in the field to enhance the overall productivity

This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.

Table of Contents

1  INTERNET OF THINGS (IOT) – EVOLUTION, STATISTICS, AND FORECASTS

1.1 Introduction

1.2 Definition of IoT

1.3 Evolution

1.4 Related Statistics

1.5 Industrial Forecasts

1.5.1 General Forecasts

1.5.2 Security Related Forecasts

1.6 Chapter Summary

 

2  IOT ARCHITECTURE AND BUSINESS MODELS 

2.1 Introduction

2.2 IoT Architecture

2.3 Business Models for IoT

              2.3.1 What are Business Models?

              2.3.2 Components of Business Models

              2.3.3 Challenges in developing Business Model Frameworks for IoT

              2.3.4 IoT Business Models

              2.3.5 Technological Perspective on Business Models

2.4 Chapter Summary

 

3  COMMUNICATION AND DEVELOPMENT PRIMITIVES IN IOT

3.1 Introduction

3.2 Communication Protocols, Standards and Policies

3.3 Design and Development Tools

3.4 Datasets

3.5 Chapter Summary

 

4  CHALLENGES IN IOT

4.1 Introduction

4.2 Challenges associated with IoT Architecture

4.3 Challenges associated with Entities

4.4 Technology-oriented Challenges

4.5 Challenges associated with Features

4.6 Challenges associated with Development Practices

4.7 Chapter Summary

 

5  DATA EXPLOSION IN IOT

5.1 Introduction

5.2 Big Data Definition

5.3 Underlying Factors for Data Explosion in IoT

5.4 Key Challenges associated with managing Data Explosion in IoT

5.5 Technological Support

5.5.1 Machine Learning

5.5.2 Artificial Intelligence

5.5.3 Intelligent Edge Processing

5.6 Chapter Summary

 

6  COMPUTING PARADIGMS AND SECURITY ISSUES IN CONNECTED AND AUTONOMOUS DRIVING VEHICLES

6.1 Introduction

6.2 Connected and Autonomous Driving Vehicle (CADV) – A Technical Background

6.2.1 Functional Blocks

6.2.2 Underlying Technologies

6.2.3 Potential Benefits and Forecasts

6.3 Computing Paradigms

6.3.1 Artificial Intelligence (AI)

6.3.2 Vehicular Cloud Computing (VCC) or Edge Computing

6.3.3 End-to-End Networking

6.4 Security Issues and Existing Countermeasures

6.4.1 Challenges and Countermeasures associated with Computing Paradigms

6.4.2 Challenges and Countermeasures associated with Participating Entities

6.5 Ongoing Research Efforts

6.6 Open Research Challenges

6.6.1 Deployment and Operational Costs

6.6.2 Security

6.6.3 Privacy

6.6.4 Legal and Ethical Aspects

6.6.5 Validation and Testing

6.6.6 Standardization

6.6.7 Other Aspects

6.7 Chapter Summary

 

...
View More

Author(s)

Biography

Brij B. Gupta received PhD degree from Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for Canadian Commonwealth Scholarship awarded by Government of Canada. He published more than 175 research papers in international journals and conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Interscience, etc. He has visited several countries, i.e. Canada, Japan, Malaysia, Australia, China, Hong Kong, Italy, Spain, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. Dr. Gupta also received Young Faculty research fellowship award from Ministry of Electronics and Information Technology, Government of India in 2017. He is also working as principal investigator of various R&D projects. He is serving as associate editor of IEEE Access, IEEE TII, Associate editor of IJICS, Interscience and Executive editor of IJITCA, Interscience, respectively. He is also serving as reviewer for Journals of IEEE, Springer, Wiley, Taylor & Francis, etc. He is also serving as guest editor of various reputed Journals. He was also visiting researcher with University of Murcia (UMU), Spain, Deakin University, Australia and Yamaguchi University, Japan in 2018, 2017 and 2015, respectively. At present, Dr. Gupta is working as Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest include information security, Cyber Security, Cloud Computing, Web security,iIntrusion detection, and phishing. Megha Quamara received her Master of Technology (M. Tech.) Degree specialized in Cyber Security from National Institute of Technology (NIT), Kurukshetra, India, in 2018, and Bachelor of Technology (B. Tech.) degree in Computer Science and Engineering from University Institute of Engineering and Technology (UIET), Kurukshetra University, India, in 2015. Her research interests include security in Internet of Things (IoT) and Cloud Computing, Authentication in Smart Card Technology, and Data Privacy.