Limit search to available items
Book Cover
E-book
Author Jamali, Mohammad Ali Jabraeil, author

Title Towards the Internet of Things : architectures, security, and applications / Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi
Published Cham, Switzerland : Springer, [2020]

Copies

Description 1 online resource (x, 134 pages) : illustrations
Series EAI/Springer innovations in communication and computing
EAI/Springer innovations in communication and computing.
Contents Intro; Preface; Contents; Chapter 1: The IoT Landscape; 1 What Is IoT?; 2 Applications; 3 Architectures; 4 Security; 5 This Book; References; Chapter 2: IoT Architecture; 1 Introduction; 1.1 Three-and Five-Layer Architectures; 2 Survey on Domain-Specific Useful IoT Architectures; 2.1 RFID; Electronic Product Code Based IoT Architecture; 2.2 Service-Oriented Architecture (SOA); IoT Middleware Architecture; 2.3 Wireless Sensor Network (WSN); Agricultural Monitoring IoT Architecture; 2.4 IoT Architecture for Smart Cities; 2.5 IoT-Fog Architecture
2.6 IoT-Based Architecture for Healthcare Development2.7 Object-Based Security Architecture (OSCAR); 2.8 Cyber-Physical and Social Security Architecture; 2.9 Hierarchical Architecture of Security; 2.10 Media-Aware Traffic Security Architecture; 2.11 HIMMO-Based Security Architecture; 2.12 Security Architecture Based on IoTNetWar; 3 Conclusion; References; Chapter 3: IoT Security; 1 Introduction; 2 Backgrounds, Threats, and Attacks; 2.1 Why Security Is More Challenging in IoT?; 2.2 Background on Security Services; 2.3 Cryptography; Lightweight Cryptography; Symmetric Key Cryptography
Asymmetric Key Cryptography2.4 The Architecture of Security; 2.5 Security Challenges and Issues; Perception Layer Challenges; Unauthorized Access to Tags; Node Capture Attacks; Tag Cloning; False Data Injection Attacks; Network Layer Challenges; Spoofing Attack; Sinkhole Attack; Sleep Deprivation Attack; Denial-of-Service (DoS) Attack; Unsecured Protocols; Application Layer Challenges; Phishing Attack; Malicious Virus/Worm; Sniffing Attack; Malicious Scripts; Reverse Engineering; 2.6 Intrusion Detection System (IDS); Anomaly-Based; Signature-Based; Specification-Based; Hybrid
2.7 Security Features of IoTConfidentiality; Integrity; Availability; Identification and Authentication; Privacy; Trust; 3 IoT Applications and Security Needs; 3.1 Smart Home; 3.2 Smart Connected Health; 3.3 Smart Grid; 4 Overview of Privacy; 4.1 Privacy Preservation; 4.2 Data Collection; 4.3 Data Collection Policy; 4.4 Device Privacy; 4.5 Enhancing Privacy and Privacy Through Design Measures; 4.6 Information Privacy; 5 Trust and Authentication; 5.1 Trust; 5.2 Trust Properties and Objectives of Trust Management; 5.3 Trust Establishment; 5.4 Trust Evaluation; 5.5 User Trust; 5.6 Authentication
Business AuthenticationLightweight Authentication; 5.7 IoT Authentication Architecture; 5.8 Access Control; 5.9 Less Security Preparation; 6 IoT Data Security; 6.1 The Architecture of IoT Data Security; 6.2 IoT's Data Security Technologies; 6.3 Data Minimization; 6.4 Firewall; 6.5 Forensics in IoT; Evidence Identification, Collection, and Preservation; Evidence Analysis and Correlation; Attack or Deficit Attribution; 6.6 IoT Security Using Machine Learning; 7 IoT Architectural Security Design; 7.1 Fog/Edge Computing-Based IoT; 7.2 End-to-End Things Security; 7.3 Edge Security Layer Service
Summary This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (EBSCO, viewed June 17, 2019)
Subject Internet of things.
Electronics.
Microelectronics.
Electrical engineering.
Electronics
Miniaturization
User-Computer Interface
electrical engineering.
microelectronics.
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
Internet of things
Form Electronic book
Author Bahrami, Bahareh, author
Heidari, Arash, author
Allahverdizadeh, Parisa, author
Norouzi, Farhad, author
ISBN 9783030184681
3030184684