000 03647cam a2200553Ki 4500
001 9781003127598
003 FlBoTFG
005 20220711212113.0
006 m o d
007 cr cnu|||unuuu
008 210913s2021 xx eo 000 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781003127598
_q(electronic bk.)
020 _a1003127592
_q(electronic bk.)
020 _z9780367650513
020 _a9781000422474
_q(electronic bk. : EPUB)
020 _a100042247X
_q(electronic bk. : EPUB)
020 _a9781000421729
_q(electronic bk. : PDF)
020 _a1000421724
_q(electronic bk. : PDF)
020 _z9780367650490
035 _a(OCoLC)1267989638
035 _a(OCoLC-P)1267989638
050 4 _aTK5105.8857
072 7 _aCOM
_x091000
_2bisacsh
072 7 _aCOM
_x021030
_2bisacsh
072 7 _aCOM
_x059000
_2bisacsh
072 7 _aUB
_2bicssc
082 0 4 _a005.8
_223
245 0 0 _aSecurity of Internet of Things Nodes :
_bChallenges, Attacks, and Countermeasures.
250 _aFirst edition.
264 1 _a[Place of publication not identified] :
_bChapman and Hall/CRC,
_c2021.
300 _a1 online resource (xii, 308 pages).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aChapman & Hall CRC internet of things
505 0 _aSecuring Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices
520 _aThe book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
588 _aOCLC-licensed vendor bibliographic record.
650 7 _aCOMPUTERS / Database Management / Data Mining
_2bisacsh
_912290
650 7 _aCOMPUTERS / Computer Engineering
_2bisacsh
_94770
650 0 _aInternet of things
_xSecurity measures.
_96353
700 1 _aChakraborty, Chinmay,
_d1984-
_eeditor.
_913165
700 1 _aRajendran, Sree Ranjani,
_eeditor.
_913166
700 1 _aRehman, Muhammad Habibur,
_eeditor.
_913167
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003127598
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c70380
_d70380