1st Edition

Secure Communication in Internet of Things Emerging Technologies, Challenges, and Mitigation

    338 Pages 82 B/W Illustrations
    by CRC Press

    The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.

    Features:

    • Explores the new Internet of Things security challenges, threats, and future regulations to end-users
    • Presents authentication, authorization, and anonymization techniques in the Internet of Things
    • Illustrates security management through emerging technologies such as blockchain and artificial intelligence
    • Highlights the theoretical and architectural aspects, foundations of security, and privacy of the Internet of Things framework
    • Discusses artificial-intelligence-based security techniques, and cloud security for the Internet of Things

    It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in fields such as electrical engineering, electronics and communications engineering, computer engineering, and information technology.

    Chapter 1. Introduction to Internet of Things Security
    Chhaya Suryabhan Dule, K.M. Rajasekharaiah

    Chapter 2. IoT Hardware, Platform and Security Protocols
    R. Malathy, Sheeja V. Francis

    Chapter 3. Secure Device Management and Device Attestation in IoT
    V. Hari Santhosh, A. Babiyola, C. Chitra

    Chapter 4. Secure Operating Systems and Software
    S. Koushik, M. Chaitra

    Chapter 5. Wireless Physical Layer Security
    V. Saranya, P. Manjula, S. Raja Shree, A. Jemshia Mirram, M. Nafees Muneera

    Chapter 6. Lightweight crypto mechanisms and Key management in IoT scenario
    Yasha Jyothi M. Shirur, S. Bindu, Jyoti R. Munavalli

    Chapter 7. Secure data collection, aggregation, and sharing in the Internet of Things
    Sanjay Mate, Vikas Somani, Prashant Dahiwale

    Chapter 8. Authentication, Authorization and Anonymization techniques in the IoT
    V.M. Sivagami, M. Deekshitha, N. Devi, S. Swarna Parvathi

    Chapter 9. Secure Identity, Access, and Mobility Management in the Internet of Things
    S. Angel Deborah, S. Rajalakshmi, T.T. Mirnalinee

    Chapter 10. Privacy-preserving scheme for Internet of Things
    T. Kavitha, G. Senbagavalli, S. Saraswathi

    Chapter 11. Trust Establishment Models in IoT
    V. Rajeswari, K. Sakthipriya

    Chapter 12. Secure communication protocols for the IoT
    Prathibha Kiran, S. Shilpa

    Chapter 13. Adaptive Security in the Internet of Things
    M. Esther Hannah, N. Vanitha

    Chapter 14. Covert Communication security methods
    A. Babiyola, C. Chitra, V. Hari Santhosh

    Chapter 15. Clean-slate and cross-layer IoT security Design
    S. Rajarajeswari, N. Hema

    Chapter 16. Edge computing technology for secure IoT
    D. Bhuvana Suganthi, Indumathy D, Panimozhi K, P.Kavitha, Punitha A, S.Saravanan

    Chapter 17. Cloud Security for the IoT
    Prashant Dahiwale, M.M. Raghuwanshi, Sanjay Mate

    Chapter 18. IoT Security using Blockchain
    P. Sankar, Anitha Kumari

    Chapter 19. IoT ecosystem-level security auditing, analysis, and Recovery
    Anita Shukla, Ankit Jain, Puspraj Singh Chauhan, Raghvendra Singh

    Chapter 20. Risk Assessment and Vulnerability Analysis in the IoT
    Vanajaroselin Chirchi, S. Nirmala, Emmanvelraj M. Chirchi, S. L. Karthik Raj, E.C. Khushi

    Chapter 21. Threat Models and Attack Strategies in the Internet of Things
    V. M. Sivagami, K. KiruthikaDevi, V. Vidhya, S. Swarna Parvathi

    Chapter 22. Security and Privacy Issues in IoT
    K. P. K. Devan, B. S. Liya, P. Indumathy

    Chapter 23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques
    S. Shalini, S. Sheela, Shabeen Taj, Madhumala.R. Bagalatti

    Chapter 24. Intrusion & malware detection and prevention techniques in IoT
    Ramanpreet Kaur, Parveen Singla, Jaskirat Kaur, Balram Kumar

    Chapter 25. 5G and 6G security issues and countermeasures
    T. R. Reshmi, Kunal Abhishek

    Biography

    T. Kavitha is working as a Professor in the Department of Computer Engineering, New Horizon College of Engineering, Visvesvaraya Technological University, Karnataka, India.

    M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India.

    V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India.

    Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.