Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations Front Cover

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

by
  • Length: 604 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2016-04-06
  • ISBN-10: 1498723187
  • ISBN-13: 9781498723183
  • Sales Rank: #2160015 (See Top 100 Books)
Description

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question “How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?”

The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.

The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Table of Contents

Part I: Threats and Attacks
Chapter 1: Internet of Things (IoT) as Interconnection of Threats (IoT)
Chapter 2: Attack, Defense, and Network Robustness of Internet of Things
Chapter 3: Sybil Attack Detection in Vehicular Networks
Chapter 4: Malware Propagation and Control in Internet of Things
Chapter 5: A Solution-Based Analysis of Attack Vectors on Smart Home Systems

Part II: Privacy Preservation
Chapter 6: Privacy Preservation Data Dissemination
Chapter 7: Privacy Preservation for IoT Used in Smart Buildings
Chapter 8: Exploiting Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles
Chapter 9: Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing

Part III: Trust and Authentication
Chapter 10: Trust and Trust Models for the IoT
Chapter 11: Trustable Fellowships of Self-Organizing “Things” and Their Software Representatives: An Emerging Architecture Model for IoT Security and Privacy
Chapter 12: Preventing Unauthorized Access to Sensor Data
Chapter 13: Authentication in IoT

Part IV: IoT Data Security
Chapter 14: Computational Security for the IoT and Beyond
Chapter 15: Privacy-Preserving Time Series Data Aggregation for Internet of Things
Chapter 16: A Secure Path Generation Scheme for Real-Time Green Internet of Things
Chapter 17: Security Protocols for IoT Access Networks

Part V: Social Awareness
Chapter 18: A User-Centric Decentralised Governance Framework for Privacy and Trust in IoT
Chapter 19: A Policy-Based Approach for Informed Consent in Internet of Things
Chapter 20: Security and Impact of the Internet of Things (IoT) on Mobile Networks

To access the link, solve the captcha.