|
Showing 1 - 3 of
3 matches in All Departments
This book presents the security and privacy challenges of the smart
home following the logic of "terminal device - voice interface -
application platform". For each component, the authors provide
answers to the three questions: 1) In the terminal device layer,
how to conduct cross-layer privacy breach analysis and provide
effective countermeasures; 2) In the voice interface layer, how to
design effective and lightweight schemes to defend against voice
spoofing; 3) In the application layer, how to design an effective
anomaly detection system without breaching the application
platform. The authors conduct a thorough analysis of the security
threats and challenges in each component of the smart home, review
the existing state-of-the-art solutions proposed by other
researchers, and elaborate on proposed countermeasures. This book
aims to provide both security threats analysis and state-of-the-art
countermeasures for the smart home network.
|
Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Kuai Xu, Haojin Zhu
|
R1,714
Discovery Miles 17 140
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 10th International
Conference on Wireless Algorithms, Systems, and Applications, WASA
2015, held in Qufu, Shandong, China, in August 2015. The 36 revised
full papers presented together with 5 revised short papers and 42
invited papers were carefully reviewed and selected from 133
initial submissions. The papers present current trends, challenges,
and state-of-the-art solutions related to various issues in
wireless networks. Topics of interests include effective and
efficient state-of-the-art algorithm design and analysis, reliable
and secure system development and implementations, experimental
study and testbed validation, and new application exploration in
wireless networks. .
This book presents several novel approaches to model the
interaction between the attacker and the defender and assess the
security of Vehicular Ad Hoc Networks (VANETs). The first security
assessment approach is based on the attack tree security assessment
model, which leverages tree based methods to analyze the risk of
the system and identify the possible attacking strategies the
adversaries may launch. To further capture the interaction between
the attacker and the defender, the authors propose to utilize the
attack-defense tree model to express the potential countermeasures
which could mitigate the system. By considering rational
participants that aim to maximize their payoff function, the brief
describes a game-theoretic analysis approach to investigate the
possible strategies that the security administrator and the
attacker could adopt. A phased attack-defense game allows the
reader to model the interactions between the attacker and defender
for VANET security assessment. The brief offers a variety of
methods for assessing the security of wireless networks.
Professionals and researchers working on the defense of VANETs will
find this material valuable.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|