BS Publications
logologo
logo
logo
logo
 
 
Breakline Breakline
 
 
Search:
OR OR OR
 
 
 
Book Details
Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations
Author(s) :Fei Hu

image
ISBN : 9781032707150
Name : Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations
Price : Currency 2995.00
Author/s : Fei Hu
Type : Text Book
Pages : 604
Year of Publication : Rpt. 2024
Publisher : CRC Press / BSP Books
Binding : Paperback
BUY NOW
Evaluation Copy, Review Form instagramlogo facebooklogo 20 20 20 20

About the Book: 

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?"

The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.

The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Contents: 

Section I: Threats and Attacks

1.    Internet of Things (IoT) as Interconnection of Threats (IoT)

2.    Attack, Defense, and Network Robustness of Internet of Things

3.    Sybil Attack Detection in Vehicular Networks

4.    Malware Propagation and Control in Internet of Things

5.    Solution-Based Analysis of Attack Vectors on Smart Home Systems

Section II: Privacy Preservation

6.    Privacy Preservation Data Dissemination

7.    Privacy Preservation for IoT Used in Smart Buildings

8.    Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles

9.    Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing

Section III: Trust and Authentication

10. Trust and Trust Models for the IoT

11. Trustable Fellowships of Self-Organizing "Things" and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy

12. Preventing Unauthorized Access to Sensor Data

13. Authentication in IoT

Section IV: IOT Data Security

14. Computational Security for the IoT and Beyond

15. Privacy-Preserving Time Series Data Aggregation for Internet of Things

16. A Secure Path Generation Scheme for Real-Time Green Internet of Things

17. Security Protocols for IoT Access Networks

Section V: Social Awareness

18. A User-Centric Decentralized Governance Framework for Privacy and Trust in IoT

19. A Policy-Based Approach for Informed Consent in Internet of Things

       20. Security and Impact of the Internet of Things (IoT) on Mobile Networks

About the Author:

Fei Hu is currently a professor in the Department of Electrical and Computer Engineering at the University of Alabama, Tuscaloosa. He obtained his PhDs at Tongji University (Shanghai, China) in the field of signal processing (in 1999), and at Clarkson University, (New York), in electrical and computer engineering (in 2002). He has published over 200 journal/conference papers and books. Dr. Hu’s research has been supported by the U.S. National Science Foundation, Cisco, Sprint, and other sources. His research expertise may be summarized as 3S: security, signals, and sensors. (1) Security: This concerns how to overcome different cyberattacks in a complex wireless or wired network. Recently, he has focused on cyberphysical system security and medical security issues. (2) Signals: This mainly refers to intelligent signal processing, that is, using machine learning algorithms to process sensing signals in a smart way in order to extract patterns (i.e., pattern recognition). (3) Sensors: This includes microsensor design and wireless sensor networking issues.
   « Back
Like us on our Pages
instagramlogo Facebooklogo 20 20 20 20
 
logo logo logo
  footer 2024, BSP Books. Website design by BSP Books, Best viewed in 1024x768. footer