Contents:
Section I: Threats and Attacks
1. Internet of Things (IoT) as Interconnection of
Threats (IoT)
2. Attack, Defense, and Network Robustness of
Internet of Things
3. Sybil Attack Detection in Vehicular Networks
4. Malware Propagation and Control in Internet of Things
5. Solution-Based Analysis of Attack Vectors on
Smart Home Systems
Section II: Privacy Preservation
6. Privacy Preservation Data Dissemination
7. Privacy Preservation for IoT Used in Smart
Buildings
8. Exploiting Mobility Social Features for
Location Privacy Enhancement in Internet of Vehicles
9. Lightweight and Robust Schemes for Privacy
Protection in Key Personal IoT Applications: Mobile WBSN and Participatory
Sensing
Section III: Trust and Authentication
10. Trust and Trust Models for the IoT
11. Trustable Fellowships of Self-Organizing
"Things" and Their Software Representatives: An Emerging Architecture
Model for IoT Security and Privacy
12. Preventing Unauthorized Access to Sensor Data
13. Authentication in IoT
Section IV: IOT Data Security
14. Computational Security for the IoT and Beyond
15. Privacy-Preserving Time Series Data Aggregation
for Internet of Things
16. A Secure Path Generation Scheme for Real-Time
Green Internet of Things
17. Security Protocols for IoT Access Networks
Section V: Social Awareness
18. A User-Centric Decentralized Governance
Framework for Privacy and Trust in IoT
19. A Policy-Based Approach for Informed Consent in
Internet of Things
20. Security
and Impact of the Internet of Things (IoT) on Mobile Networks |