IoT Security IoT Security

IoT Security

Advances in Authentication

    • €114.99
    • €114.99

Publisher Description

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security 
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

GENRE
Professional & Technical
RELEASED
2019
24 December
LANGUAGE
EN
English
LENGTH
320
Pages
PUBLISHER
Wiley
PROVIDER INFO
John Wiley & Sons Ltd
SIZE
18.3
MB
Security and Privacy in Cyberspace Security and Privacy in Cyberspace
2022
Implementing and Leveraging Blockchain Programming Implementing and Leveraging Blockchain Programming
2022
Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
2022
Multimedia Technologies in the Internet of Things Environment, Volume 3 Multimedia Technologies in the Internet of Things Environment, Volume 3
2022
Recent Advancements in ICT Infrastructure and Applications Recent Advancements in ICT Infrastructure and Applications
2022
Mobile Edge Computing and Communications Mobile Edge Computing and Communications
2024
Security and Privacy Vision in 6G Security and Privacy Vision in 6G
2023
6G Frontiers 6G Frontiers
2022
The Wiley 5G REF The Wiley 5G REF
2021
A Comprehensive Guide to 5G Security A Comprehensive Guide to 5G Security
2018
Software Defined Mobile Networks (SDMN) Software Defined Mobile Networks (SDMN)
2015