1st Edition
Secure Communication in Internet of Things Emerging Technologies, Challenges, and Mitigation
The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.
Features:
- Explores the new Internet of Things security challenges, threats, and future regulations to end-users
- Presents authentication, authorization, and anonymization techniques in the Internet of Things
- Illustrates security management through emerging technologies such as blockchain and artificial intelligence
- Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
- Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things
It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.
Chapter 1. Introduction to Internet of Things Security
Chhaya Suryabhan Dule, K.M. Rajasekharaiah
Chapter 2. IoT Hardware, Platform and Security Protocols
R. Malathy, Sheeja V. Francis
Chapter 3. Secure Device Management and Device Attestation in IoT
V. Hari Santhosh, A. Babiyola, C. Chitra
Chapter 4. Secure Operating Systems and Software
S. Koushik, M. Chaitra
Chapter 5. Wireless Physical Layer Security
V. Saranya, P. Manjula, S. Raja Shree, A. Jemshia Mirram, M. Nafees Muneera
Chapter 6. Lightweight crypto mechanisms and Key management in IoT scenario
Yasha Jyothi M. Shirur, S. Bindu, Jyoti R. Munavalli
Chapter 7. Secure data collection, aggregation, and sharing in the Internet of Things
Sanjay Mate, Vikas Somani, Prashant Dahiwale
Chapter 8. Authentication, Authorization and Anonymization techniques in the IoT
V.M. Sivagami, M. Deekshitha, N. Devi, S. Swarna Parvathi
Chapter 9. Secure Identity, Access, and Mobility Management in the Internet of Things
S. Angel Deborah, S. Rajalakshmi, T.T. Mirnalinee
Chapter 10. Privacy-preserving scheme for Internet of Things
T. Kavitha, G. Senbagavalli, S. Saraswathi
Chapter 11. Trust Establishment Models in IoT
V. Rajeswari, K. Sakthipriya
Chapter 12. Secure communication protocols for the IoT
Prathibha Kiran, S. Shilpa
Chapter 13. Adaptive Security in the Internet of Things
M. Esther Hannah, N. Vanitha
Chapter 14. Covert Communication security methods
A. Babiyola, C. Chitra, V. Hari Santhosh
Chapter 15. Clean-slate and cross-layer IoT security Design
S. Rajarajeswari, N. Hema
Chapter 16. Edge computing technology for secure IoT
D. Bhuvana Suganthi, Indumathy D, Panimozhi K, P.Kavitha, Punitha A, S.Saravanan
Chapter 17. Cloud Security for the IoT
Prashant Dahiwale, M.M. Raghuwanshi, Sanjay Mate
Chapter 18. IoT Security using Blockchain
P. Sankar, Anitha Kumari
Chapter 19. IoT ecosystem-level security auditing, analysis, and Recovery
Anita Shukla, Ankit Jain, Puspraj Singh Chauhan, Raghvendra Singh
Chapter 20. Risk Assessment and Vulnerability Analysis in the IoT
Vanajaroselin Chirchi, S. Nirmala, Emmanvelraj M. Chirchi, S. L. Karthik Raj, E.C. Khushi
Chapter 21. Threat Models and Attack Strategies in the Internet of Things
V. M. Sivagami, K. KiruthikaDevi, V. Vidhya, S. Swarna Parvathi
Chapter 22. Security and Privacy Issues in IoT
K. P. K. Devan, B. S. Liya, P. Indumathy
Chapter 23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques
S. Shalini, S. Sheela, Shabeen Taj, Madhumala.R. Bagalatti
Chapter 24. Intrusion & malware detection and prevention techniques in IoT
Ramanpreet Kaur, Parveen Singla, Jaskirat Kaur, Balram Kumar
Chapter 25. 5G and 6G security issues and countermeasures
T. R. Reshmi, Kunal Abhishek
Biography
T. Kavitha is working as a Professor in the Department of Computer Engineering, New Horizon College of Engineering, Visvesvaraya Technological University, Karnataka, India.
M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India.
V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India.
Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.