Reference Hub2
Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity

Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity

ISBN13: 9781522507413|ISBN10: 1522507418|EISBN13: 9781522507420
DOI: 10.4018/978-1-5225-0741-3.ch001
Cite Chapter Cite Chapter

MLA

Dawson, Maurice. "Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity." Security Solutions for Hyperconnectivity and the Internet of Things, edited by Maurice Dawson, et al., IGI Global, 2017, pp. 1-12. https://doi.org/10.4018/978-1-5225-0741-3.ch001

APA

Dawson, M. (2017). Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity. In M. Dawson, M. Eltayeb, & M. Omar (Eds.), Security Solutions for Hyperconnectivity and the Internet of Things (pp. 1-12). IGI Global. https://doi.org/10.4018/978-1-5225-0741-3.ch001

Chicago

Dawson, Maurice. "Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity." In Security Solutions for Hyperconnectivity and the Internet of Things, edited by Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, 1-12. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0741-3.ch001

Export Reference

Mendeley
Favorite

Abstract

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.