000 04268nam a22005415i 4500
001 978-3-030-77764-7
003 DE-He213
005 20220801220634.0
007 cr nn 008mamaa
008 211130s2021 sz | s |||| 0|eng d
020 _a9783030777647
_9978-3-030-77764-7
024 7 _a10.1007/978-3-030-77764-7
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aSniatala, Pawel.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_951479
245 1 0 _aEvolution of Smart Sensing Ecosystems with Tamper Evident Security
_h[electronic resource] /
_cby Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXIX, 155 p. 80 illus., 70 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Part I: Growth of Sensory devices and their proliferation into daily life -- Smart Objects in Cyber-Physical Systems -- IoT Security -- Part II: Securing the Internet-of-Things enabled Smart Environments -- Understanding the smart systems -- Onboarding new IoT Devices -- Part III Cryptosystems - Foundations and the current state-of-the-art -- Symmetric key Cryptography -- Asymmetric Key Cryptography -- Part IV Modern Encryption Schemes -- Homomorphic Encryption -- Popular Homomorphic Encryption Schemes -- Industrial involvement in the use of Homomorphic Encryption -- Non-malleable cryptosystem -- Machine Learning based Cryptosystems -- Neural Cryptography -- Part V: Creating a Tamper Evident System for the Cyber Era -- Tamper evident system – Our Major Proposition -- Part VI: Feasibility and Performance Analysis -- Implementation Details -- Threat Model -- Part VII: Future Directions -- Quantum Cryptography -- Quantum Tools -- Applications -- Conclusion.
520 _aThis book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others. .
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aElectric power production.
_927574
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aElectrical Power Engineering.
_931821
700 1 _aIyengar, S.S.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_951480
700 1 _aRamani, Sanjeev Kaushik.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_951481
710 2 _aSpringerLink (Online service)
_951482
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030777630
776 0 8 _iPrinted edition:
_z9783030777654
776 0 8 _iPrinted edition:
_z9783030777661
856 4 0 _uhttps://doi.org/10.1007/978-3-030-77764-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78777
_d78777