Securing the internet of things /

Saved in:
Bibliographic Details
Author / Creator:Li, Shancang, author.
Imprint:Cambridge, MA : Syngress, an imprint of Elsevier, [2017]
©2017
Description:1 online resource (144 pages) : illustrations
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11270899
Hidden Bibliographic Details
Other authors / contributors:Xu, Li D., author.
Romdhani, Imed, contributor.
ISBN:9780128045053
0128045051
0128044586
9780128044582
9780128044582
0128044586
Notes:Includes bibliographical references and index.
Print version record.
Summary:"Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher.
Other form:Print version: Li, Shancang. Securing the internet of things. Cambridge, MA : Syngress, an imprint of Elsevier, [2017] 9780128044582
Standard no.:9780128044582
Table of Contents:
  • 1. Introduction: securing the Internet of Things
  • 2. Security architecture in the Internet of Things
  • 3. Security and vulnerability in the Internet of Things
  • 4. IoT node authentication
  • 5. Security requirements in IoT architecture
  • 6. Security in enabling technologies
  • 7. Existing security scheme for IoT
  • 8. Security concerns in social IoT
  • 9. Confidentiality and security for IoT based healthcare.