Coverart for item
The Resource Security Challenges and Approaches in Internet of Things

Security Challenges and Approaches in Internet of Things

Label
Security Challenges and Approaches in Internet of Things
Title
Security Challenges and Approaches in Internet of Things
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
SpringerBriefs in Electrical and Computer Engineering Ser
Security Challenges and Approaches in Internet of Things
Label
Security Challenges and Approaches in Internet of Things
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4673259
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Contents -- 1 Introduction -- 2 System Model for the Internet of Things -- 2.1 The Concept of the Ì̀nternet of Things'' -- 2.2 Evolution of the Networks -- 2.3 Vision of the Internet of Things -- 2.3.1 Large Scale Ubiquitous and Pervasive Connectivity -- 2.3.2 Context-Aware Computing -- 2.3.3 Seamless Connectivity and Interoperability -- 2.3.4 Network Neutrality -- 2.4 Applications of the Internet of Things -- 2.5 Challenges -- 3 Vulnerable Features and Threats -- 3.1 Vulnerable Features of the Internet of Things -- 3.2 Threat Taxonomy -- 3.2.1 Definition of Threat -- 3.2.2 Proposed Taxonomy -- 3.2.3 System Security Threats -- 3.2.4 Privacy Threats -- 3.2.5 Reflective Trust and Reputation Threats -- 4 Securing the Internet of Things -- 4.1 Making the IoT More Secure and Private -- 4.1.1 Protocol and Network Security -- 4.1.2 Data and Privacy -- 4.1.3 Identity Management -- 4.1.4 Trust Management -- 4.1.5 Fault Tolerance -- 4.2 Standardization -- 4.3 Governance -- 4.4 Social Awareness -- 5 Social Governance -- 5.1 Evolution of Network Management and Social Governance -- 5.2 The Framework -- 5.2.1 The Hierarchical Distributed Policy Management System -- 5.2.2 Policy Compliant Smart Devices -- 5.2.3 HDPMS and PCSDs in Action -- 5.2.4 Communications in HDPMS-PCSDs Setup -- 5.2.5 Policy Resolution in the HDPMS -- 5.2.6 Local Consent Polling Mechanism -- 5.2.7 Trusted Computing Base in the IoT -- 5.2.8 Social Governance for Policy Makers -- 5.2.9 Social Governance for Innovators/Manufacturers -- 5.2.10 Social Governance for Users -- 5.3 Example of Utility -- 6 Case Studies of Selected IoT Deployments -- 6.1 Connected Vehicles -- 6.1.1 Significance of Connected Vehicles -- 6.1.2 Background on Vehicular Networks -- 6.1.3 Attacks Classification with Selected Countermeasures -- 6.2 eHealth -- 6.2.1 Security and Privacy Significance
  • 6.2.2 Risks, Vulnerabilities, and Threats Classification -- 6.2.3 Security Requirements and Attack Scenarios -- 6.2.4 Selected eHealth Security Models -- 6.3 The Smart Grid -- 6.3.1 Selected Cases of Security Incidents -- 6.3.2 Further Reading -- 7 Conclusions and Future Work -- 7.1 Conclusions -- 7.2 Future Work -- References
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319442303&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4386016'}
Extent
1 online resource (110 pages)
Form of item
online
Isbn
9783319442303
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...