Buch, Englisch, 293 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 555 g
ISBN: 978-3-030-18077-5
Verlag: Springer International Publishing
In this context, this book explorescentral issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include:• Basic concepts, principles and related technologies• Security/privacy of data, and trust issues• Mechanisms for security, privacy, trust and authentication• Success indicators, performance metrics and future directions.
This reference text is aimed at supporting a number of potential audiences, including• Network Specialists, Hardware Engineers and Security Experts • Students, Researchers, Academics and Practitioners.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Part I: Security and Privacy in IoT: Technologies and Frameworks.- Chapter 1. Managing Cyber Security Risks of SCADA Networks of Critical Infrastructures in the IoT Environment.- Chapter 2. Energy-Perceptive Authentication in Virtual Private Networks using GPS Data.- Chapter 3. Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography.- Chapter 4. Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT.- Chapter 5. Countering the IoT-Powered Volumetric Cyber Attacks with Next Generation Cyber Firewall: Seddulbahir.- Chapter 6. Blockchain for Ensuring Security, Privacy and Trust in IoT Environments: The State of The Art.- Chapter 7. A Novel Quantum Encryption and Authentication Framework integrated with IoT.- PART II: Privacy and Trust in IoT: Healthcare applications and IoV.- Chapter 8. Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues.- Chapter 9.A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine.- Chapter 10. Trust Management for Software-defined Heterogeneous Vehicular Ad hoc Networks.- Chapter 11. A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users.- Chapter 12. Securing Packet Transmission through Trusted Shortest Network Path using Fuzzy Forecasting for Mobility of MANET Nodes.