Applied Approach to Privacy and Security for the Internet of Things

Applied Approach to Privacy and Security for the Internet of Things

Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Emmanuel Benoist (Bern University of Applied Sciences, Switzerland) and Asoke Nath (St. Xavier's College, Kolkata, India)
Release Date: June, 2020|Copyright: © 2020 |Pages: 295
ISBN13: 9781799824442|ISBN10: 1799824446|EISBN13: 9781799824466|DOI: 10.4018/978-1-7998-2444-2

Description

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities.

Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Bio-Sensor Safety
  • Cyber Laws
  • Industry Automation Risks
  • Malware Propagation
  • Middleware Systems
  • Mobile Security Infrastructure
  • Nano-Sensor Security
  • Smart Home Vulnerabilities
  • Trust Models
  • Ubiquitous Computing

Table of Contents and List of Contributors

Search this Book:
Reset