Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations

By: Material type: TextTextPublication details: New York CRC Press 2025Description: xx, 584p. 23 x 17 cmISBN:
  • 9781032707150
DDC classification:
  • 004.678 FEI
Summary: Contents: Section I: Threats and Attacks 1. Internet of Things (IoT) as Interconnection of Threats (IoT) 2. Attack, Defense, and Network Robustness of Internet of Things 3. Sybil Attack Detection in Vehicular Networks 4. Malware Propagation and Control in Internet of Things 5. Solution-Based Analysis of Attack Vectors on Smart Home Systems Section II: Privacy Preservation 6. Privacy Preservation Data Dissemination 7. Privacy Preservation for IoT Used in Smart Buildings 8. Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles 9. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing Section III: Trust and Authentication 10. Trust and Trust Models for the IoT 11. Trustable Fellowships of Self-Organizing "Things" and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy 12. Preventing Unauthorized Access to Sensor Data 13. Authentication in IoT Section IV: IOT Data Security 14. Computational Security for the IoT and Beyond 15. Privacy-Preserving Time Series Data Aggregation for Internet of Things 16. A Secure Path Generation Scheme for Real-Time Green Internet of Things 17. Security Protocols for IoT Access Networks Section V: Social Awareness 18. A User-Centric Decentralized Governance Framework for Privacy and Trust in IoT 19. A Policy-Based Approach for Informed Consent in Internet of Things 20. Security and Impact of the Internet of Things (IoT) on Mobile Networks
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Reference Reference Raj Kumar Goel Institute of Technology IOT (Internet of Things) 004.678 FEI (Browse shelf(Opens below)) Not for loan 97292
Reference Reference Raj Kumar Goel Institute of Technology IOT (Internet of Things) 004.678 FEI (Browse shelf(Opens below)) Not for loan 97293

Contents:

Section I: Threats and Attacks

1. Internet of Things (IoT) as Interconnection of Threats (IoT)

2. Attack, Defense, and Network Robustness of Internet of Things

3. Sybil Attack Detection in Vehicular Networks

4. Malware Propagation and Control in Internet of Things

5. Solution-Based Analysis of Attack Vectors on Smart Home Systems

Section II: Privacy Preservation

6. Privacy Preservation Data Dissemination

7. Privacy Preservation for IoT Used in Smart Buildings

8. Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles

9. Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing

Section III: Trust and Authentication

10. Trust and Trust Models for the IoT

11. Trustable Fellowships of Self-Organizing "Things" and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy

12. Preventing Unauthorized Access to Sensor Data

13. Authentication in IoT

Section IV: IOT Data Security

14. Computational Security for the IoT and Beyond

15. Privacy-Preserving Time Series Data Aggregation for Internet of Things

16. A Secure Path Generation Scheme for Real-Time Green Internet of Things

17. Security Protocols for IoT Access Networks

Section V: Social Awareness

18. A User-Centric Decentralized Governance Framework for Privacy and Trust in IoT

19. A Policy-Based Approach for Informed Consent in Internet of Things

20. Security and Impact of the Internet of Things (IoT) on Mobile Networks

There are no comments on this title.

to post a comment.
Implemented & Customized by: BestBookBuddies

Powered by Koha