Security, privacy and trust in the IoT environment /

Saved in:
Bibliographic Details
Imprint:Cham, Switzerland : Springer, [2019]
©2019
Description:1 online resource
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11895787
Hidden Bibliographic Details
Varying Form of Title:Security, privacy and trust in the internet of things environment
Other authors / contributors:Mahmood, Zaigham, editor.
ISBN:9783030180751
3030180751
3030180743
9783030180744
9783030180768
303018076X
9783030180775
3030180778
9783030180744
Digital file characteristics:text file PDF
Notes:Includes index.
Online resource; title from PDF title page (EBSCO, viewed June 5, 2019).
Summary:The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms. These aspects call for novel network architectures and middleware platforms based on new communication technologies; as well as the adoption of novel context-aware management approaches and more efficient tools and devices. In this context, this book explores central issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include: • Basic concepts, principles and related technologies • Security/privacy of data, and trust issues • Mechanisms for security, privacy, trust and authentication • Success indicators, performance metrics and future directions. This reference text is aimed at supporting a number of potential audiences, including • Network Specialists, Hardware Engineers and Security Experts • Students, Researchers, Academics and Practitioners.
Other form:Printed edition: 9783030180744
Printed edition: 9783030180768
Printed edition: 9783030180775
Standard no.:10.1007/978-3-030-18075-1

MARC

LEADER 00000cam a2200000Ii 4500
001 11895787
006 m o d
007 cr cnu|||unuuu
008 190603s2019 sz o 001 0 eng d
005 20240711190648.7
015 |a GBB9A9114  |2 bnb 
016 7 |a 019425714  |2 Uk 
019 |a 1105180359  |a 1107108693  |a 1110895114  |a 1115072680  |a 1122810457  |a 1122896038  |a 1126120705  |a 1152327175  |a 1156338752  |a 1162717533 
020 |a 9783030180751  |q (electronic bk.) 
020 |a 3030180751  |q (electronic bk.) 
020 |a 3030180743 
020 |a 9783030180744 
020 |a 9783030180768  |q (print) 
020 |a 303018076X 
020 |a 9783030180775  |q (print) 
020 |a 3030180778 
020 |z 9783030180744 
024 7 |a 10.1007/978-3-030-18075-1  |2 doi 
035 |a (OCoLC)1103319974  |z (OCoLC)1105180359  |z (OCoLC)1107108693  |z (OCoLC)1110895114  |z (OCoLC)1115072680  |z (OCoLC)1122810457  |z (OCoLC)1122896038  |z (OCoLC)1126120705  |z (OCoLC)1152327175  |z (OCoLC)1156338752  |z (OCoLC)1162717533 
035 9 |a (OCLCCM-CC)1103319974 
037 |a com.springer.onix.9783030180751  |b Springer Nature 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d LQU  |d UKMGB  |d GW5XE  |d UPM  |d OCLCF  |d OH1  |d VT2  |d LEATE  |d UX1  |d OCLCQ  |d UKAHL 
049 |a MAIN 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a UKN  |2 bicssc 
072 7 |a UKN  |2 thema 
245 0 0 |a Security, privacy and trust in the IoT environment /  |c editor, Zaigham Mahmood. 
246 3 |a Security, privacy and trust in the internet of things environment 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 |a Online resource; title from PDF title page (EBSCO, viewed June 5, 2019). 
500 |a Includes index. 
505 0 |a Part I: Security and Privacy in IoT: Technologies and Frameworks -- Chapter 1. Managing Cyber Security Risks of SCADA Networks of Critical Infrastructures in the IoT Environment -- Chapter 2. Energy-Perceptive Authentication in Virtual Private Networks using GPS Data -- Chapter 3. Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography -- Chapter 4. Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT -- Chapter 5. Countering the IoT-Powered Volumetric Cyber Attacks with Next Generation Cyber Firewall: Seddulbahir -- Chapter 6. Blockchain for Ensuring Security, Privacy and Trust in IoT Environments: The State of The Art -- Chapter 7. A Novel Quantum Encryption and Authentication Framework integrated with IoT -- PART II: Privacy and Trust in IoT: Healthcare applications and IoV -- Chapter 8. Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues -- Chapter 9. A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine -- Chapter 10. Trust Management for Software-defined Heterogeneous Vehicular Ad hoc Networks -- Chapter 11. A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users -- Chapter 12. Securing Packet Transmission through Trusted Shortest Network Path using Fuzzy Forecasting for Mobility of MANET Nodes. 
520 |a The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms. These aspects call for novel network architectures and middleware platforms based on new communication technologies; as well as the adoption of novel context-aware management approaches and more efficient tools and devices. In this context, this book explores central issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include: • Basic concepts, principles and related technologies • Security/privacy of data, and trust issues • Mechanisms for security, privacy, trust and authentication • Success indicators, performance metrics and future directions. This reference text is aimed at supporting a number of potential audiences, including • Network Specialists, Hardware Engineers and Security Experts • Students, Researchers, Academics and Practitioners. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Internet of things  |x Security measures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 4 |a Electronic books. 
700 1 |a Mahmood, Zaigham,  |e editor. 
776 0 8 |i Printed edition:  |z 9783030180744 
776 0 8 |i Printed edition:  |z 9783030180768 
776 0 8 |i Printed edition:  |z 9783030180775 
903 |a HeVa 
929 |a oclccm 
999 f f |i dd2d0487-b7fa-530b-a61c-663460f9532c  |s 56f397e3-9718-558d-8939-b80d096cb55b 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-18075-1  |z Springer Nature  |g ebooks  |i 12562302