Security Solutions for Hyperconnectivity and the Internet of Things

Security Solutions for Hyperconnectivity and the Internet of Things

Maurice Dawson (University of Missouri-St. Louis, USA), Mohamed Eltayeb (Colorado Technical University, USA) and Marwan Omar (Saint Leo University, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: August, 2016|Copyright: © 2017 |Pages: 347
ISBN13: 9781522507413|ISBN10: 1522507418|EISBN13: 9781522507420|DOI: 10.4018/978-1-5225-0741-3

Description

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability.

Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Blackhole Attacks
  • Certificate-less Signature Scheme
  • Civil Aviation
  • Distributed Computing System
  • Internet of Everything
  • Regulatory Standards
  • Secure Computing
  • Trust Management
  • Web of Things

Reviews and Testimonials

Computer scientists, electrical engineers, and information technology specialists present solutions they have devised or discovered for security threats to the Internet of Things and hyper-connectivity. Among their topics are Internet of Things research challenges, security solutions for intelligent complex systems, enhancing cyber security for the financial industry through compliance and regulatory standards, trust management in cloud computing, security issues in distributed computing system models, and cyber threats in civil aviation.

– Protoview Reviews

Table of Contents and List of Contributors

Search this Book:
Reset

Author(s)/Editor(s) Biography

Maurice Dawson serves as an Assistant Professor of Information Systems at University of Missouri-St. Louis, former Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering at The University of Tennessee Space Institute, and Fulbright Scholar: Specialist in the Faculty of Computational Mathematics & Informatics at South Ural State University in Chelyabinsk, Russia. Dawson is recognized as an Information Assurance System Architect and Engineer by the U.S. Department of Defense. Research focus area is cyber security, systems security engineering, open source software (OSS), mobile security, and engineering management.
Mohamed Eltayeb is a dependable, conscientious, and enthusiastic engineer who possesses a wealth of comprehensive experience working with complex technologies from the early stages of design through to post-implementation adaptation. His research specializes in the areas of cloud computing, data privacy and security, cyber security solutions, enterprise information management, information assurance, and mobile computing. His research efforts to date have specifically focused on examining the user acceptance of new technologies, and he has conducted detailed and comprehensive analysis of user acceptance in the domain of cloud computing. Dr. Eltayeb is also actively associated with a number of professional organizations, including the Association for Computing Machinery (ACM), CTU Alumni Association, and the International Association of Engineers (IAENG).
Marwan Omar serves an Assistant Professor of Computer Science at the department of computer science and CIS. Prior to joining Academia, Omar worked for Hewlett-Packard as a database developer where he helped build, design, and implement MS SQL database for their software and hardware products in the server industry. Omar is recognized for his information security expertise and knowledge and holds a security + certification from Comptia. Research interests are: cyber security, mobile security, open source software, and cloud computing.

Indices