Secure and Privacy-Preserving Data Communication in Internet of Things - Liehuang Zhu, Zijian Zhang, Chang Xu

Secure and Privacy-Preserving Data Communication in Internet of Things (eBook)

eBook Download: PDF | EPUB
2017 | 1st ed. 2017
VII, 78 Seiten
Springer Singapore (Verlag)
978-981-10-3235-6 (ISBN)
58,84 € inkl. MwSt
Systemvoraussetzungen
63,22 € inkl. MwSt
Systemvoraussetzungen
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.



Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.
Zijian Zhang is an assistant professor in the School of Computer Science and
Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young
Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.

Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication  Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on ' Security and Privacy Challenges in Vehicular Cloud Computing', 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT afterreading this book.

Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.Zijian Zhang is an assistant professor in the School of Computer Science and Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication  Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on " Security and Privacy Challenges in Vehicular Cloud Computing", 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.

Introduction.- Secure Data Aggregation in Wireless Sensor Network.- Privacy preserving Meter Reading Transmission in Smart Grid.- Key Agreement and Management in Vehicular Ad-hoc Network.- Conclusion.

Erscheint lt. Verlag 22.2.2017
Reihe/Serie SpringerBriefs in Electrical and Computer Engineering
SpringerBriefs in Electrical and Computer Engineering
SpringerBriefs in Signal Processing
SpringerBriefs in Signal Processing
Zusatzinfo VII, 78 p. 22 illus., 10 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte cryptographic protocols • data aggregation • data confidentiality • Data Integrity • Data Security • Internet of Things (IoT) • Key Agreement Protocol • Privacy Protection • Vehicular ad-hoc network • wireless sensor network
ISBN-10 981-10-3235-1 / 9811032351
ISBN-13 978-981-10-3235-6 / 9789811032356
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 2,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99