|
Showing 1 - 5 of
5 matches in All Departments
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
This provides a comprehensive overview of the key principles of
security concerns surrounding the upcoming Internet of Things
(IoT), and introduces readers to the protocols adopted in the IoT.
It also analyses the vulnerabilities, attacks and defense
mechanisms, highlighting the security issues in the context of big
data. Lastly, trust management approaches and ubiquitous learning
applications are examined in detail. As such, the book sets the
stage for developing and securing IoT applications both today and
in the future.
A heterogeneous network is a network which connects computers and
other devices with different operating systems, protocols, or
access technologies. By definition, managing heterogenous networks
is more difficult that homogenous networks. Confidentiality,
integrity, availability (CIA) remain the foundation of security.
This book sheds light upon security threats, defenses, and
remediation on various networking and data processing domains,
including wired networks, wireless networks, mobile ad-hoc
networks, wireless sensor networks, and social networks through the
prisms of confidentiality, integrity, availability, authentication,
and access control. The book is broken into different chapters that
explore central subjects and themes in the development of the
heterogenous networks we see today. The chapters look at: Access
control methods in cloud-enabled Internet of Things Secure routing
algorithms for mobile ad-hoc networks Building security trust in
mobile ad-hoc networks using soft computing methods The use and
development of Blockchain technology, with a particular focus on
the nonce-free hash generation in Blockchain Password
authentication and keystroke biometrics Health care data analytics
over Big Data Bluetooth: and its open issues for managing security
services in heterogenous networks Managing Security Services in
Heterogenous Networks will be a valuable resource for a whole host
of undergraduate and postgraduate students studying related topics,
as well as career professionals who have to effectively manage
heterogenous networks in the workplace.
A heterogeneous network is a network which connects computers and
other devices with different operating systems, protocols, or
access technologies. By definition, managing heterogenous networks
is more difficult that homogenous networks. Confidentiality,
integrity, availability (CIA) remain the foundation of security.
This book sheds light upon security threats, defenses, and
remediation on various networking and data processing domains,
including wired networks, wireless networks, mobile ad-hoc
networks, wireless sensor networks, and social networks through the
prisms of confidentiality, integrity, availability, authentication,
and access control. The book is broken into different chapters that
explore central subjects and themes in the development of the
heterogenous networks we see today. The chapters look at: Access
control methods in cloud-enabled Internet of Things Secure routing
algorithms for mobile ad-hoc networks Building security trust in
mobile ad-hoc networks using soft computing methods The use and
development of Blockchain technology, with a particular focus on
the nonce-free hash generation in Blockchain Password
authentication and keystroke biometrics Health care data analytics
over Big Data Bluetooth: and its open issues for managing security
services in heterogenous networks Managing Security Services in
Heterogenous Networks will be a valuable resource for a whole host
of undergraduate and postgraduate students studying related topics,
as well as career professionals who have to effectively manage
heterogenous networks in the workplace.
This provides a comprehensive overview of the key principles of
security concerns surrounding the upcoming Internet of Things
(IoT), and introduces readers to the protocols adopted in the IoT.
It also analyses the vulnerabilities, attacks and defense
mechanisms, highlighting the security issues in the context of big
data. Lastly, trust management approaches and ubiquitous learning
applications are examined in detail. As such, the book sets the
stage for developing and securing IoT applications both today and
in the future.
|
|