Reference Hub2
Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity

Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity

Maurice Dawson
ISBN13: 9781522598664|ISBN10: 1522598669|EISBN13: 9781522598671
DOI: 10.4018/978-1-5225-9866-4.ch053
Cite Chapter Cite Chapter

MLA

Dawson, Maurice. "Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity." Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1186-1195. https://doi.org/10.4018/978-1-5225-9866-4.ch053

APA

Dawson, M. (2020). Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity. In I. Management Association (Ed.), Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (pp. 1186-1195). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch053

Chicago

Dawson, Maurice. "Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity." In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1186-1195. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9866-4.ch053

Export Reference

Mendeley
Favorite

Abstract

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.