Internet of Things Security - Chuan-Kun Wu

Internet of Things Security (eBook)

Architectures and Security Measures

(Autor)

eBook Download: PDF
2021 | 1st ed. 2021
XIX, 245 Seiten
Springer Singapore (Verlag)
978-981-16-1372-2 (ISBN)
Systemvoraussetzungen
181,89 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference between IoT security and traditional system and data security. 

It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control.  However, in practical IoT system construction, many more security measures need to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.



Chuan-Kun Wu is currently a Distinguished Professor at Linyi University. He was a Research Professor supported by the '100-talent program' of the Chinese Academy of Sciences from 2003 to 2016. Prof. Wu has published nearly 200 reviewed papers, and has recently published 3 books in Chinese on the Internet of Things (IoT), including 'Security Fundamentals for Internet of Things' and 'Industrial Control Network Security: Technology and Practice'. In 2016, his book 'Boolean Functions and their applications to cryptography' was published by Springer.

Prof. Wu has been a senior member of IEEE since 2000, was an Associate Editor for IEEE Communications Letters from 2002-2012, and served as PC co-chair and organizing co-chair of a number of international conferences in the areas of cryptology and information security.


This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides an in-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control.  However, in practical IoT system construction, many more security measures need to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
Erscheint lt. Verlag 3.6.2021
Reihe/Serie Advances in Computer Science and Technology
Advances in Computer Science and Technology
Zusatzinfo XIX, 245 p. 79 illus., 29 illus. in color.
Sprache englisch
Original-Titel Security Techniques in Internet of Things
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Schlagworte Cyberphysics Security • Industrial Control System Security • internet of things • IoT security • Key Management • Lightweight cryptography • Security Measure • security protocol • sensor network security
ISBN-10 981-16-1372-9 / 9811613729
ISBN-13 978-981-16-1372-2 / 9789811613722
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99