Security and privacy in the Internet of things : architectures, techniques, and applications /

"The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities of...

Full description

Saved in:
Bibliographic Details
Corporate Authors: Wiley Online Library (Online service)
Group Author: Awad, Ali Ismail; Abawajy, Jemal H., 1982-
Published: Wiley-IEEE Press,
Publisher Address: Hoboken, NJ :
Publication Dates: [2022]
Literature type: eBook
Language: English
Subjects:
Online Access: https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755
Summary: "The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities, have led to a huge amount of data generated from versatile domains, thus, information security has become inevitable requirement not only for personal safety, but also for assuring the sustainability of the IoT paradigm itself"--
Item Description: Description based on print version record.
Carrier Form: 1 online resource (336 pages)
Also available in print.
Bibliography: Includes bibliographical references and index.
ISBN: 9781119607755 (electronic book)
9781119607748
Index Number: TK5105
CLC: TP393.4
Contents: Advanced attacks and protection mechanisms in IoT devices and networks -- Human aspects of IoT security and privacy -- Applying zero trust security principles to defence mechanisms against data exfiltration attacks -- eSIM-based authentication protocol for UAV remote identification -- Collaborative intrusion detection in the era of IoT : recent advances and challenges -- Cyber-securing IoT infrastructure by modeling network traffic -- Integrity of IoT network flow records in encrypted traffic analytics -- Securing contemporary eHealth architectures : techniques and methods -- Security and privacy of smart homes : issues and solutions -- IoT hardware-based security : a generalized review of threats and countermeasures.