SECURITY AND PRIVACY IN THE INTERNET OF THINGS [electronic resource].
Contributor(s): Rameem Zahra, Syed [editor.] | Ahsan Chishti, Mohammad [editor.].
Material type: BookPublisher: BOCA RATON : CHAPMAN & HALL CRC, 2020Description: 1 online resource.ISBN: 1000286304; 9781000286304; 9781003016304; 1003016308; 9781000286328; 1000286320; 9781000286311; 1000286312.Subject(s): Internet of things -- Security measures | COMPUTERS / Computer Engineering | COMPUTERS / Information Technology | COMPUTERS / Networking / GeneralDDC classification: 005.8 Online resources: Taylor & Francis | OCLC metadata license agreement Summary: This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. Covers all aspects of security Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions Discusses ways for achieving better access control and trust in the IoT ecosystem Contributes exhaustive strategic plans to deal with security issues of IoT Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. Covers all aspects of security Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions Discusses ways for achieving better access control and trust in the IoT ecosystem Contributes exhaustive strategic plans to deal with security issues of IoT Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
OCLC-licensed vendor bibliographic record.
There are no comments for this item.