1st Edition

Internet of Things Vulnerabilities and Recovery Strategies

    360 Pages 77 B/W Illustrations
    by Auerbach Publications

    The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:

    • Data Routing
    • Data Integrity
    • Device Supervision
    • IoT Integration
    • Information Storage
    • IoT Performance

    The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

    1. The Internet of Things (IoT): A Cripple to Data Privacy & Security
    Hannah Divyanka Doss and Achyutananda Mishra

    2. Cyber-Physical Threat Intelligence for IoT Using Machine Learning
    Sunil Sonawane and Reshma Gulwani

    3. Privacy Preservation in Cyber Physical Systems using Entropy-Based Techniques
    Manas Kumar Yogi and A.S.N. Chakravarthy

    4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic Methodologies
    P. Harikrishna and Dr R Kaviarasan

    5. Security of IoT and Its Solutions
    Pallavi and Sandeep Joshi

    6. A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices
    Manikandan Rajagopal and Ramkumar S.

    7. Managing and Securing Information Storage in Internet of Things
    Aamir Salam Ahanger, Faheem Syeed Masoodi, Asra Khanam, and Wasia Ashraf

    8. Mitigation of Internet of Things: Cloud Security Challenges by Using Adaptive Security Principles
    Syed Irfan Yaqoob, Shubhalaxmi Joshi, and Syed Wajid Aalam

    9. IoT Security with Blockchain Technology in the Financial Sector
    Divyashree K. S. and Achyutananda Mishra

    10. Self-Adaptive Cyber-Physical Systems in IoT
    Nimish Kumar and Himanshu Verma

    11. Internet of Things (IoT): Security and Privacy Issues in IoT and Its Solutions
    Namita Tiwari, Ashutosh Tripathi, Amit Virmani, and Praveen Kumar Agarwal

    12. The Dark Side of Internet of Things in E-Commerce: Uncovering the Misuse of Personal Information
    Hannah Divyanka Doss and Achyutananda Mishra

    13. Intrusion Detection in Home Automation in IoT
    Pawan Whig, Shama Kouser, Ashima Bhatnagar Bhatia ,Rahul Reddy Nadikattu, and Yusuf Jibrin Alkali

    14. IoT Performance Assessment
    Tawseef Ahmed Teli, Faheem Syeed Masoodi, and Alwi Bamhdi

    15. Case Studies on IoT Systems Performance Analysis
    Mohini Preetam Singh, Praveen Kumar, and Deepak Singh

    16. Privacy and Security Issues in Smart Homes in an IoT
    Bazila Farooq

    17. Enhancing Security: Tetecting Intrusions in IoT-Based Home Automation                                     Himanshu Verma and Nimish Kumar

    Biography

    Faheem Syeed Masoodi is Assistant Professor in the Department of Computer Science, University of Kashmir. Earlier, he served College of Computer Science, University of Jizan, Saudi Arabia as an Assistant Professor.

    Alwi M. Bamhdi is an associate professor in the Department of Computer Sciences, Umm Al-Qura University, Saudi Arabia. He received his MSc and Ph.D. in computer science in 2014 from Heriot-Watt University, UK.

    Majid A.Charoo has worked as a technology consultant in Global Science & Technology Forum, Singapore and was an Assistant Professor in Al-Jouf University, Saudi Arabia in the department of Information Sciences.

    Zubair Sayeed Masoodi is an assistant professor and head of the Computer Applications Department at Government Degree College for Women Sopore, India.  He is currently heading the Department of Computer Applications of this college.

    Arif Mohammad is a Lead Digital Engineer at Louis Dreyfus Company, The Netherlands.

    Gousiya Hussain is currently pursuing a PhD in the domain of Cloud Security from the Department of Computer Sciences, Mewar University, India.