Beginner's Guide to Internet of Things Security
portes grátis
Beginner's Guide to Internet of Things Security
Attacks, Applications, Authentication, and Fundamentals
Tewari, Aakanksha; Gupta, Brij B.
Taylor & Francis Ltd
08/2022
112
Mole
Inglês
9781032400754
15 a 20 dias
145
Descrição não disponível.
Preface
Acknowledgments
Authors
1 Evolution of Internet of Things (IoT): History, Forecasts, and Security
2 IoT Design, Standards, and Protocols
3 IoT's Integration with Other Technologies
4 Industrial Internet of Things (IIoT)
5 Trust and Privacy in IoT
6 Authentication Mechanisms for IoT Networks
7 Provable Security Models and Existing Protocols
8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment
References
Index
Acknowledgments
Authors
1 Evolution of Internet of Things (IoT): History, Forecasts, and Security
2 IoT Design, Standards, and Protocols
3 IoT's Integration with Other Technologies
4 Industrial Internet of Things (IIoT)
5 Trust and Privacy in IoT
6 Authentication Mechanisms for IoT Networks
7 Provable Security Models and Existing Protocols
8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment
References
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
DBS Bank;IPv6 Address;cross-layer architecture;IoT Device;authentication-based security schemes;FU Berlin;Internet of Things security;Linked Data Resources;radio frequency identification tags;Fog Computing;Cyber Physical Systems;IoT Network;IoT Application;PPT Algorithm;Mutual Authentication Protocols;IoT Architecture;IETF Work Group;IoT System;IoT Security;RFID Tag;RFID Device;IoT Data;IPv6 Internet;IETF Protocol;Industrial Control Systems;Authentication Protocol;RFID Technology;EMAP
Preface
Acknowledgments
Authors
1 Evolution of Internet of Things (IoT): History, Forecasts, and Security
2 IoT Design, Standards, and Protocols
3 IoT's Integration with Other Technologies
4 Industrial Internet of Things (IIoT)
5 Trust and Privacy in IoT
6 Authentication Mechanisms for IoT Networks
7 Provable Security Models and Existing Protocols
8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment
References
Index
Acknowledgments
Authors
1 Evolution of Internet of Things (IoT): History, Forecasts, and Security
2 IoT Design, Standards, and Protocols
3 IoT's Integration with Other Technologies
4 Industrial Internet of Things (IIoT)
5 Trust and Privacy in IoT
6 Authentication Mechanisms for IoT Networks
7 Provable Security Models and Existing Protocols
8 An Internet of Things (IoT)-Based Security Approach Ensuring Robust Location Privacy for the Healthcare Environment
References
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
DBS Bank;IPv6 Address;cross-layer architecture;IoT Device;authentication-based security schemes;FU Berlin;Internet of Things security;Linked Data Resources;radio frequency identification tags;Fog Computing;Cyber Physical Systems;IoT Network;IoT Application;PPT Algorithm;Mutual Authentication Protocols;IoT Architecture;IETF Work Group;IoT System;IoT Security;RFID Tag;RFID Device;IoT Data;IPv6 Internet;IETF Protocol;Industrial Control Systems;Authentication Protocol;RFID Technology;EMAP