Ubiquitous computing and computing security of IoT / N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in t...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
[2019]
|
Series: | Studies in big data ;
v. 47. |
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b10450510 | ||
003 | CoU | ||
005 | 20190404053412.3 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 181013s2019 sz ob 000 0 eng d | ||
019 | |a 1056743966 |a 1076528903 | ||
020 | |a 9783030015664 |q electronic book | ||
020 | |a 3030015661 |q electronic book | ||
020 | |z 9783030015657 | ||
020 | |z 3030015653 | ||
035 | |a (OCoLC)spr1056909525 | ||
035 | |a (OCoLC)1056909525 |z (OCoLC)1056743966 |z (OCoLC)1076528903 | ||
037 | |a spr978-3-030-01566-4 | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d GW5XE |d YDX |d OCLCF |d N$T |d OCLCQ |d UAB |d CAUOI |d YDXIT |d UKMGB |d UX1 | ||
049 | |a GWRE | ||
050 | 4 | |a TK5105.8857 |b .U25 2019 | |
245 | 0 | 0 | |a Ubiquitous computing and computing security of IoT / |c N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors. |
264 | 1 | |a Cham, Switzerland : |b Springer, |c [2019] | |
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Studies in big data ; |v volume 47. | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Intro; Contents; Security Protocols for IoT; 1 IoT Introduction and Security Overview; 2 IoT Security Requirements; 3 IoT Security Issues; 4 IoT Security Challenges; 4.1 IoT Hardware; 4.2 IoT Software and Firmware; 4.3 Insecure Network Communication; 4.4 Data Leaks from Cloud; 4.5 Threats and Attack Vectors; 5 IoT Protocol Architecture; 6 IoT Security Attacks; 6.1 Attacks on Firmware; 6.2 Attacks on Data; 6.3 TELNET Based Attacks; 6.4 DDOS Attack; 6.5 roBOT + NETwork (BOTNET); 6.6 Malware; 7 IoT Security Solutions; 7.1 Transport Layer Solutions; 7.2 Application Layer Solutions. | |
505 | 8 | |a 7.3 Network Layer SolutionsReferences; Security of Big Data in Internet of Things; 1 Introduction; 2 Introduction to Internet of Things and Big Data; 2.1 Internet of Things; 2.2 Big Data; 2.3 Big Data Analytics; 2.4 Relationship Between Big Data Analytics and IoT; 2.5 Architecture of IoT for Big Data Analytics; 3 Privacy of Big IoT Data; 3.1 Big Data Privacy at Data Generation Phase; 3.2 Big Data Privacy at Data Storage Phase; 3.3 Privacy Preservation Approaches for Cloud Storage; 3.4 Verification of Integrity of Data in Big Data Storage; 3.5 Privacy Preserving of Big Data in Data Processing. | |
505 | 8 | |a 4 A Secure Mechanism for Big Data Collection on Internet of Vehicles4.1 Initialization Phase; 4.2 First Time Log-on; 4.3 Once Again Log-on; 4.4 Collecting Data Securely; 4.5 Data Storage Security; 5 Providing Security to Big Sensing Data Streams Using Dynamic Prime Number Based Security Verification; 5.1 Security Verification of Data Streams; 5.2 Architecture of Secure Data Stream; 5.3 Purpose of Symmetric Key Cryptography; 5.4 Setup of DPBSV System; 5.5 Handshaking of DPBSV; 5.6 Security Verification of DPBSV; 6 Conclusion; References. | |
505 | 8 | |a IoT for Ubiquitous Learning Applications: Current Trends and Future Prospects1 Introduction; 2 Previous Work on Ubiquitous Learning Applications; 2.1 Early Attempts at Ubiquitous Learning Environments; 2.2 The Introduction of Passive Sensors to Ubiquitous Learning; 2.3 IoT-Assisted Ubiquitous Learning; 3 The Generic IoT Architecture; 4 Ubiquitous Learning Applications Mapped to the IoT Architecture; 5 Future Prospects and Recommendations; 6 Conclusion; References; Trust Management Approaches in Mobile Adhoc Networks; 1 Introduction; 2 Literature Review. | |
505 | 8 | |a 3 TDQM-Trust Scheme for Discovering and Quarantine the Misbehaviors in MANET3.1 Energy Auditor; 3.2 Direct Trust Monitor; 3.3 Indirect Trust Monitor; 3.4 Packet Modification Auditor; 3.5 Trust Aggregator; 3.6 Certificate Authority; 3.7 Trust Categorization Using Fuzzy; 3.8 CA Issuing Certificates; 3.9 Malicious Node Detection; 4 Simulation Results and Discussion; 5 CEBTM-Context Residual Energy Based Trust Management in MANET Network; 5.1 Context Data Manager; 5.2 Trust Manager; 5.3 Fuzzy Analysis; 5.4 Trust Monitor; 5.5 Echo Agent; 5.6 Simulation Results and Discussion. | |
500 | |a 6 ETMRP-Enhancing Trust in MANET Using Trust and Dynamic with Energy Efficient Multipath Routing Protocol. | ||
520 | |a This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. | ||
588 | |a Description based on online resource; title from digital title page (viewed on February 14, 2019) | ||
650 | 0 | |a Internet of things |x Security measures. | |
650 | 0 | |a Ubiquitous computing. |0 http://id.loc.gov/authorities/subjects/sh2002000759. | |
650 | 7 | |a Ubiquitous computing. |2 fast |0 (OCoLC)fst01160283. | |
700 | 1 | |a Jeyanthi, N., |e editor. | |
700 | 1 | |a Abraham, Ajith, |d 1968- |e editor. |0 http://id.loc.gov/authorities/names/n2002158811 |1 http://isni.org/isni/0000000121040579. | |
700 | 1 | |a Mcheick, Hamid, |e editor. | |
776 | 0 | 8 | |i Print version: |a Jeyanthi, N. |t Ubiquitous Computing and Computing Security of IoT. |d Cham : Springer, ©2018 |z 9783030015657. |
830 | 0 | |a Studies in big data ; |v v. 47. |0 http://id.loc.gov/authorities/names/no2014005813. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-01566-4 |z Full Text (via Springer) |
907 | |a .b104505102 |b 03-19-20 |c 04-16-19 | ||
998 | |a web |b 04-30-19 |c b |d b |e - |f eng |g sz |h 0 |i 1 | ||
907 | |a .b104505102 |b 07-02-19 |c 04-16-19 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b104505102 |b 04-30-19 |c 04-16-19 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Engineering eBooks 2019 English+International | ||
999 | f | f | |i b2345637-d375-5515-b6f0-e5d5fae3b7d9 |s 0d559ca8-310d-50e7-9f4f-f5f562f2c9e9 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TK5105.8857 .U25 2019 |h Library of Congress classification |i Ebooks, Prospector |n 1 |