Custom cover image
Custom cover image

Securing the internet of things / Shancang Li, Li Da Xu ; Imed Romdhani, contributor

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Cambridge, MA : Syngress, [2017]Copyright date: ©2017Description: 1 Online-Ressource (144 pages)ISBN:
  • 0128045051
  • 9780128045053
Subject(s): Additional physical formats: 0128044586 | 9780128044582 | Erscheint auch als: Securing the internet of things. Druck-Ausgabe Cambridge, MA : Syngress, Elsevier, 2017. x, 144 SeitenDDC classification:
  • 004.67/8
RVK: RVK: ST 277LOC classification:
  • TK5105.8857
Online resources: Summary: 1.3.2 Security in Integration of WSN and RFID1.3.3 Security in Communications; 1.3.4 Security in Networks; 1.3.5 Security in Service Management; 1.4 Security Concerns in IoT Applications; 1.4.1 Security Concerns in SCADA Systems; 1.4.2 Security Concerns in Enterprise Information Systems; 1.4.3 Security Concerns in Social IoT; 1.4.4 Confidentiality and Security for IoT-Based Healthcare; 1.5 Summary; References; 2 Security Architecture in the Internet of Things; 2.1 Introduction; 2.2 Security Requirements in IoT; 2.2.1 IoT Data Security Challenges; 2.2.1.1 Data Confidentiality; 2.2.1.2 PrivacySummary: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisherSummary: 2.4.3 Capability-Based Access2.4.4 Challenges in Access Control; 2.5 Threats to Access Control, Privacy, and Availability; 2.5.1 Threats in Network Layer; 2.5.2 Threats in Sensing Layer; 2.5.3 Threats in Cross-Layer and Maintenance of IoT; 2.6 Attacks Specific to IoT; 2.6.1 Physical Access; 2.6.2 Local Attacks Over WiFi; References; 3 Security and Vulnerability in the Internet of Things; 3.1 Secrecy and Secret-Key Capacity; 3.2 Authentication/Authorization for Smart Devices; 3.3 Transport Encryption; 3.3.1 Transport Layer Security; 3.3.2 Secure Sockets Layer; 3.3.3 HTTPSSummary: 3.3.4 Transport Trust in IoT3.4 Secure Cloud/Web Interface; 3.5 Secure Software/Firmware; 3.6 Physical Layer Security; 3.7 Summary; References; Further Reading; 4 IoT Node Authentication; 4.1 Security Goals in IoT; 4.2 Public-Key-Based Authentication; 4.2.1 Symmetric Cryptography; 4.2.1.1 AES-CCM; 4.2.2 Public-Key Cryptography; 4.2.3 Public Key Infrastructure; 4.3 Identify-Based Authentication, Encryption, and Digital Signature; 4.3.1 Identify-Based Authentication; 4.3.2 Digital Signature; 4.3.3 Raw Public Key; 4.3.4 X.509 Certificates; 4.4 IP ConnectivitySummary: Front Cover; Securing the Internet of Things; Copyright Page; Contents; About the Authors; 1 Introduction: Securing the Internet of Things; 1.1 Introduction; 1.1.1 Overview; 1.1.2 State-of-the-Art; 1.1.3 Security Requirements; 1.2 Security Requirements in IoT Architecture; 1.2.1 Sensing Layer and IoT End-Nodes; 1.2.2 Network Layer; 1.2.3 Service Layer; 1.2.4 Application-Interface Layer; 1.2.5 Cross-Layer Threats; 1.2.6 Threats Caused in Maintenance of IoT; 1.3 Security in Enabling Technologies; 1.3.1 Security in Identification and Tracking TechnologiesPPN: PPN: 881802980Package identifier: Produktsigel: ZDB-4-NLEBK
No physical items for this record