Security of Internet of Things Nodes : (Record no. 70380)

000 -LEADER
fixed length control field 03647cam a2200553Ki 4500
001 - CONTROL NUMBER
control field 9781003127598
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212113.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210913s2021 xx eo 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003127598
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003127592
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000422474
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 100042247X
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000421729
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000421724
-- (electronic bk. : PDF)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 00 - TITLE STATEMENT
Title Security of Internet of Things Nodes :
Sub Title Challenges, Attacks, and Countermeasures.
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (xii, 308 pages).
490 0# - SERIES STATEMENT
Series statement Chapman & Hall CRC internet of things
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices
520 ## - SUMMARY, ETC.
Summary, etc The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Chakraborty, Chinmay,
700 1# - AUTHOR 2
Author 2 Rajendran, Sree Ranjani,
700 1# - AUTHOR 2
Author 2 Rehman, Muhammad Habibur,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003127598
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- [Place of publication not identified] :
-- Chapman and Hall/CRC,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Database Management / Data Mining
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Computer Engineering
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet of things

No items available.