رکورد قبلیرکورد بعدی

" Towards the Internet of Things : "


Document Type : BL
Record Number : 861850
Main Entry : Jamali, Mohammad Ali Jabraeil
Title & Author : Towards the Internet of Things : : architectures, security, and applications /\ Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
Publication Statement : Cham, Switzerland :: Springer,, [2020]
Series Statement : EAI/Springer innovations in communication and computing
Page. NO : 1 online resource
ISBN : 3030184684
: : 9783030184681
: 9783030184674
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Preface; Contents; Chapter 1: The IoT Landscape; 1 What Is IoT?; 2 Applications; 3 Architectures; 4 Security; 5 This Book; References; Chapter 2: IoT Architecture; 1 Introduction; 1.1 Three-and Five-Layer Architectures; 2 Survey on Domain-Specific Useful IoT Architectures; 2.1 RFID; Electronic Product Code Based IoT Architecture; 2.2 Service-Oriented Architecture (SOA); IoT Middleware Architecture; 2.3 Wireless Sensor Network (WSN); Agricultural Monitoring IoT Architecture; 2.4 IoT Architecture for Smart Cities; 2.5 IoT-Fog Architecture
: 2.6 IoT-Based Architecture for Healthcare Development2.7 Object-Based Security Architecture (OSCAR); 2.8 Cyber-Physical and Social Security Architecture; 2.9 Hierarchical Architecture of Security; 2.10 Media-Aware Traffic Security Architecture; 2.11 HIMMO-Based Security Architecture; 2.12 Security Architecture Based on IoTNetWar; 3 Conclusion; References; Chapter 3: IoT Security; 1 Introduction; 2 Backgrounds, Threats, and Attacks; 2.1 Why Security Is More Challenging in IoT?; 2.2 Background on Security Services; 2.3 Cryptography; Lightweight Cryptography; Symmetric Key Cryptography
: 2.7 Security Features of IoTConfidentiality; Integrity; Availability; Identification and Authentication; Privacy; Trust; 3 IoT Applications and Security Needs; 3.1 Smart Home; 3.2 Smart Connected Health; 3.3 Smart Grid; 4 Overview of Privacy; 4.1 Privacy Preservation; 4.2 Data Collection; 4.3 Data Collection Policy; 4.4 Device Privacy; 4.5 Enhancing Privacy and Privacy Through Design Measures; 4.6 Information Privacy; 5 Trust and Authentication; 5.1 Trust; 5.2 Trust Properties and Objectives of Trust Management; 5.3 Trust Establishment; 5.4 Trust Evaluation; 5.5 User Trust; 5.6 Authentication
: Asymmetric Key Cryptography2.4 The Architecture of Security; 2.5 Security Challenges and Issues; Perception Layer Challenges; Unauthorized Access to Tags; Node Capture Attacks; Tag Cloning; False Data Injection Attacks; Network Layer Challenges; Spoofing Attack; Sinkhole Attack; Sleep Deprivation Attack; Denial-of-Service (DoS) Attack; Unsecured Protocols; Application Layer Challenges; Phishing Attack; Malicious Virus/Worm; Sniffing Attack; Malicious Scripts; Reverse Engineering; 2.6 Intrusion Detection System (IDS); Anomaly-Based; Signature-Based; Specification-Based; Hybrid
: Business AuthenticationLightweight Authentication; 5.7 IoT Authentication Architecture; 5.8 Access Control; 5.9 Less Security Preparation; 6 IoT Data Security; 6.1 The Architecture of IoT Data Security; 6.2 IoT's Data Security Technologies; 6.3 Data Minimization; 6.4 Firewall; 6.5 Forensics in IoT; Evidence Identification, Collection, and Preservation; Evidence Analysis and Correlation; Attack or Deficit Attribution; 6.6 IoT Security Using Machine Learning; 7 IoT Architectural Security Design; 7.1 Fog/Edge Computing-Based IoT; 7.2 End-to-End Things Security; 7.3 Edge Security Layer Service
Abstract : This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management.
Subject : Internet of things.
Subject : COMPUTERS-- Computer Literacy.
Subject : COMPUTERS-- Computer Science.
Subject : COMPUTERS-- Data Processing.
Subject : COMPUTERS-- Hardware-- General.
Subject : COMPUTERS-- Information Technology.
Subject : COMPUTERS-- Machine Theory.
Subject : COMPUTERS-- Reference.
Subject : Internet of things.
Dewey Classification : ‭004.678‬
LC Classification : ‭TK5105.8857‬
Added Entry : Allahverdizadeh, Parisa
: Bahrami, Bahareh
: Heidari, Arash
: Norouzi, Farhad
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟