UID:
almahu_9949386133502882
Format:
1 online resource
ISBN:
9781000048452
,
1000048454
,
1000048519
,
9781000048483
,
1000048489
,
9780429353529
,
0429353529
,
9781000048513
Series Statement:
CRC focus
Content:
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept. Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field. Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivity This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.
Note:
〈P〉〈strong〉〈/strong〉〈/p〉〈p〉〈strong〉1 〈/strong〉〈strong〉INTERNET OF THINGS (IOT) -- EVOLUTION, STATISTICS, AND FORECASTS〈/strong〉〈/p〉〈p〉〈strong〉1.1 Introduction〈/strong〉〈/p〉〈p〉〈strong〉1.2 Definition of IoT〈/strong〉〈/p〉〈p〉〈strong〉1.3 Evolution〈/strong〉〈/p〉〈p〉〈strong〉1.4 Related Statistics〈/strong〉〈/p〉〈p〉〈strong〉1.5 Industrial Forecasts〈/strong〉〈/p〉〈p〉1.5.1 General Forecasts〈/p〉〈p〉1.5.2 Security Related Forecasts〈/p〉〈p〉〈strong〉1.6 Chapter Summary〈/strong〉〈strong〉〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉〈p〉〈strong〉2 IOT ARCHITECTURE AND BUSINESS MODELS 〈/strong〉〈/p〉〈p〉〈strong〉2.1 Introduction 〈/strong〉〈/p〉〈p〉〈strong〉2.2 IoT Architecture 〈/strong〉〈/p〉〈p〉〈strong〉2.3 Business Models for IoT〈/strong〉〈/p〉〈p〉 2.3.1 What are Business Models?〈/p〉〈p〉 2.3.2 Components of Business Models〈/p〉〈p〉 2.3.3 Challenges in developing Business Model Frameworks for IoT〈/p〉〈p〉 2.3.4 IoT Business Models〈/p〉〈p〉 2.3.5 Technological Perspective on Business Models〈/p〉〈p〉〈strong〉2.4 Chapter Summary〈/strong〉〈strong〉〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉〈p〉〈strong〉3 〈/strong〉〈strong〉COMMUNICATION AND DEVELOPMENT PRIMITIVES IN IOT〈/strong〉〈/p〉〈p〉〈strong〉3.1 Introduction 〈/strong〉〈/p〉〈p〉〈strong〉3.2 Communication Protocols, Standards and Policies〈/strong〉〈/p〉〈p〉〈strong〉3.3 Design and Development Tools〈/strong〉〈/p〉〈p〉〈strong〉3.4 Datasets〈/strong〉〈/p〉〈p〉〈strong〉3.5 Chapter Summary〈/strong〉〈strong〉〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉〈p〉〈strong〉4 〈/strong〉〈strong〉CHALLENGES IN IOT〈/strong〉〈/p〉〈p〉〈strong〉4.1 Introduction 〈/strong〉〈/p〉〈p〉〈strong〉4.2 Challenges associated with IoT Architecture 〈/strong〉〈/p〉〈p〉〈strong〉4.3 Challenges associated with Entities 〈/strong〉〈/p〉〈p〉〈strong〉4.4 Technology-oriented Challenges 〈/strong〉〈/p〉〈p〉〈strong〉4.5 Challenges associated with Features 〈/strong〉〈/p〉〈p〉〈strong〉4.6 Challenges associated with Development Practices 〈/strong〉〈/p〉〈p〉〈strong〉4.7 Chapter Summary〈/strong〉〈strong〉〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉〈p〉〈strong〉5 〈/strong〉〈strong〉DATA EXPLOSION IN IOT〈/strong〉〈/p〉〈p〉〈strong〉5.1 Introduction 〈/strong〉〈/p〉〈p〉〈strong〉5.2 Big Data Definition 〈/strong〉〈/p〉〈p〉〈strong〉5.3 Underlying Factors for Data Explosion in IoT 〈/strong〉〈/p〉〈p〉〈strong〉5.4 Key Challenges associated with managing Data Explosion in IoT 〈/strong〉〈/p〉〈p〉〈strong〉5.5 Technological Support〈/strong〉〈/p〉〈p〉5.5.1 Machine Learning〈/p〉〈p〉5.5.2 Artificial Intelligence〈/p〉〈p〉5.5.3 Intelligent Edge Processing〈/p〉〈p〉〈strong〉5.6 Chapter Summary〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉〈p〉〈strong〉6 〈/strong〉〈strong〉COMPUTING PARADIGMS AND SECURITY ISSUES IN CONNECTED AND AUTONOMOUS DRIVING VEHICLES〈/strong〉〈/p〉〈p〉〈strong〉6.1 Introduction 〈/strong〉〈/p〉〈p〉〈strong〉6.2 Connected and Autonomous Driving Vehicle (CADV) -- A Technical Background 〈/strong〉〈/p〉〈p〉6.2.1 Functional Blocks〈/p〉〈p〉6.2.2 Underlying Technologies〈/p〉〈p〉6.2.3 Potential Benefits and Forecasts〈/p〉〈p〉〈strong〉6.3 Computing Paradigms 〈/strong〉〈/p〉〈p〉6.3.1 Artificial Intelligence (AI)〈/p〉〈p〉6.3.2 Vehicular Cloud Computing (VCC) or Edge Computing〈/p〉〈p〉6.3.3 End-to-End Networking〈/p〉〈p〉〈strong〉6.4 Security Issues and Existing Countermeasures〈/strong〉〈/p〉〈p〉6.4.1 Challenges and Countermeasures associated with Computing Paradigms〈/p〉〈p〉6.4.2 Challenges and Countermeasures associated with Participating Entities〈/p〉〈p〉〈strong〉6.5 Ongoing Research Efforts〈/strong〉〈/p〉〈p〉〈strong〉6.6 Open Research Challenges 〈/strong〉〈/p〉〈p〉6.6.1 Deployment and Operational Costs〈/p〉〈p〉6.6.2 Security〈/p〉〈p〉6.6.3 Privacy〈/p〉〈p〉6.6.4 Legal and Ethical Aspects〈/p〉〈p〉6.6.5 Validation and Testing〈/p〉〈p〉6.6.6 Standardization〈/p〉〈p〉6.6.7 Other Aspects〈/p〉〈p〉〈strong〉6.7 Chapter Summary〈/strong〉〈/p〉〈p〉〈strong〉 〈/strong〉〈/p〉
Additional Edition:
Print version: ISBN 9781000048513
Additional Edition:
Print version: ISBN 0367373963
Additional Edition:
ISBN 9780367373962
Language:
English
Keywords:
Electronic books.
;
Electronic books.
DOI:
10.1201/9780429353529
URL:
https://www.taylorfrancis.com/books/9780429353529
Bookmarklink