Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
Fei Hu
- 出版商: CRC
- 出版日期: 2016-04-01
- 售價: $2,640
- 貴賓價: 9.5 折 $2,508
- 語言: 英文
- 頁數: 604
- 裝訂: Hardcover
- ISBN: 1498723187
- ISBN-13: 9781498723183
-
相關分類:
Algorithms-data-structures、物聯網 IoT、資訊安全
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$990$891 -
$620$527 -
$1,980$1,881 -
$580$458 -
$1,200$948 -
$450$351 -
$490$441 -
$380$323 -
$780$616 -
$360$324 -
$780$616 -
$360$284 -
$560$504 -
$620$484 -
$580$458 -
$560$437 -
$420$332 -
$680$537 -
$580$452 -
$580$493 -
$680$530 -
$580$458 -
$480$379 -
$590$502 -
$1,925$1,829
相關主題
商品描述
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?"
The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.
The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
商品描述(中文翻譯)
「物聯網(IoT)」引起了學術界和工業界的強烈興趣,但也吸引了黑客的注意。《物聯網安全與隱私:模型、演算法和實現》匯集了來自世界各地頂尖的物聯網安全專家,他們貢獻了關於不同物聯網安全方面的知識。本書回答了一個問題:“我們如何使用高效的演算法、模型和實現來涵蓋物聯網安全的四個重要方面,即機密性、身份驗證、完整性和可用性?”
本書分為五個部分,涵蓋攻擊和威脅、隱私保護、信任和身份驗證、物聯網數據安全以及社會意識。第一部分介紹了所有類型的物聯網攻擊和威脅,並展示了對抗這些攻擊的原則。它詳細介紹了特定攻擊,如惡意軟體傳播和Sybil攻擊。第二部分討論了與數據收集和分發相關的隱私保護問題,包括醫療記錄。作者以智能建築為例,討論了隱私保護解決方案。
第三部分描述了物聯網基礎設施中不同類型的信任模型,討論了對物聯網數據的存取控制,並提供了物聯網身份驗證問題的調查。第四部分強調物聯網數據計算期間的安全問題。它介紹了物聯網數據處理中的計算安全問題,時間序列數據聚合的安全設計,數據傳輸的金鑰生成以及數據存取期間的具體安全協議。第五部分考慮政策和人類行為特徵,涵蓋物聯網平台中基於社會背景的隱私和信任設計,以及物聯網中基於政策的知情同意。