Normal view MARC view ISBD view

Security of Internet of Things Nodes : Challenges, Attacks, and Countermeasures.

Contributor(s): Chakraborty, Chinmay, 1984- [editor.] | Rajendran, Sree Ranjani [editor.] | Rehman, Muhammad Habibur [editor.].
Material type: materialTypeLabelBookSeries: Chapman & Hall CRC internet of things.Publisher: [Place of publication not identified] : Chapman and Hall/CRC, 2021Edition: First edition.Description: 1 online resource (xii, 308 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781003127598; 1003127592; 9781000422474; 100042247X; 9781000421729; 1000421724.Subject(s): COMPUTERS / Database Management / Data Mining | COMPUTERS / Computer Engineering | Internet of things -- Security measuresDDC classification: 005.8 Online resources: Taylor & Francis | OCLC metadata license agreement
Contents:
Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices
Summary: The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
    average rating: 0.0 (0 votes)
No physical items for this record

Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

OCLC-licensed vendor bibliographic record.

There are no comments for this item.

Log in to your account to post a comment.