000 | 03371nam a22005535i 4500 | ||
---|---|---|---|
999 |
_c200458675 _d76887 |
||
003 | TR-AnTOB | ||
005 | 20231120151358.0 | ||
007 | cr nn 008mamaa | ||
008 | 220526s2022 si | s |||| 0|eng d | ||
020 | _a9789811915857 | ||
024 | 7 |
_a10.1007/978-981-19-1585-7 _2doi |
|
040 |
_aTR-AnTOB _beng _erda _cTR-AnTOB |
||
041 | _aeng | ||
050 | 4 | _aTK5105.8857 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
090 | _aTK5105.8857EBK | ||
245 | 1 | 0 |
_aInternet of Things _h[electronic resource] : _bSecurity and Privacy in Cyberspace / _cedited by Sandeep Saxena, Ashok Kumar Pradhan. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTransactions on Computer Systems and Networks, _x2730-7492 |
|
505 | 0 | _aPre-requisite concepts for Security and Privacy -- Basic concepts of Cloud and Fog Computing -- Access Control and Authentication in IoT -- Lightweight Cryptographic Techniques and Protocols for IoT -- Communication Security in IoT -- Intrusion Detection System with Layered Approach to Internet of Things- A Business Paradigm -- Malware Detection In IoT -- IoT Network used in Fog and Cloud Computing -- Internet of Vehicles: Features, Architecture, Privacy and Security Issues -- Cybersecurity and Ethics for IOT System : A Massive Analysis -- Blockchain for Enhancing Security of IoT Devices -- Challenges and Trends on Post Quantum Cryptography. | |
520 | _aThis book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion detection and firewall mechanisms for IoT. The book also covers topics related to embedded security mechanisms and presents suitable malware detection techniques for IoT. The book also contains a unique presentation on heterogeneous device and data management in IoT applications and showcases the major communication-level attacks and defense mechanisms related to IoT. | ||
650 | 0 | _aTelecommunication. | |
650 | 0 | _aInternet of things. | |
650 | 0 | _aData protection. | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aInternet of Things. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
653 | 0 | _aInternet of things -- Security measures | |
700 | 1 |
_aSaxena, Sandeep. _eeditor. _0(orcid)0000-0001-7879-5286 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPradhan, Ashok Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
830 | 0 |
_aTransactions on Computer Systems and Networks, _x2730-7492 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-981-19-1585-7 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |