Security, Privacy and Trust in the IoT Environment

The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users' exp...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Mahmood, Zaigham (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05315nam a2200541 4500
001 978-3-030-18075-1
003 DE-He213
005 20191026132647.0
007 cr nn 008mamaa
008 190530s2019 gw | s |||| 0|eng d
020 |a 9783030180751  |9 978-3-030-18075-1 
024 7 |a 10.1007/978-3-030-18075-1  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Security, Privacy and Trust in the IoT Environment  |h [electronic resource] /  |c edited by Zaigham Mahmood. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XXVI, 293 p. 110 illus., 89 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I: Security and Privacy in IoT: Technologies and Frameworks -- Chapter 1. Managing Cyber Security Risks of SCADA Networks of Critical Infrastructures in the IoT Environment -- Chapter 2. Energy-Perceptive Authentication in Virtual Private Networks using GPS Data -- Chapter 3. Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography -- Chapter 4. Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT -- Chapter 5. Countering the IoT-Powered Volumetric Cyber Attacks with Next Generation Cyber Firewall: Seddulbahir -- Chapter 6. Blockchain for Ensuring Security, Privacy and Trust in IoT Environments: The State of The Art -- Chapter 7. A Novel Quantum Encryption and Authentication Framework integrated with IoT -- PART II: Privacy and Trust in IoT: Healthcare applications and IoV -- Chapter 8. Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues -- Chapter 9. A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine -- Chapter 10. Trust Management for Software-defined Heterogeneous Vehicular Ad hoc Networks -- Chapter 11. A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users -- Chapter 12. Securing Packet Transmission through Trusted Shortest Network Path using Fuzzy Forecasting for Mobility of MANET Nodes. 
520 |a The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users' expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms. These aspects call for novel network architectures and middleware platforms based on new communication technologies; as well as the adoption of novel context-aware management approaches and more efficient tools and devices. In this context, this book explores central issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include: • Basic concepts, principles and related technologies • Security/privacy of data, and trust issues • Mechanisms for security, privacy, trust and authentication • Success indicators, performance metrics and future directions. This reference text is aimed at supporting a number of potential audiences, including • Network Specialists, Hardware Engineers and Security Experts • Students, Researchers, Academics and Practitioners. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Engineering ethics. 
650 0 |a Information storage and retrieval. 
650 0 |a Data structures (Computer science). 
650 1 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Privacy.  |0 http://scigraph.springernature.com/things/product-market-codes/I28010 
650 2 4 |a Engineering Ethics.  |0 http://scigraph.springernature.com/things/product-market-codes/E14030 
650 2 4 |a Information Storage and Retrieval.  |0 http://scigraph.springernature.com/things/product-market-codes/I18032 
650 2 4 |a Data Storage Representation.  |0 http://scigraph.springernature.com/things/product-market-codes/I15025 
700 1 |a Mahmood, Zaigham.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030180744 
776 0 8 |i Printed edition:  |z 9783030180768 
776 0 8 |i Printed edition:  |z 9783030180775 
856 4 0 |u https://doi.org/10.1007/978-3-030-18075-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)