IoT Security IoT Security

IoT Security

Advances in Authentication

Madhusanka Liyanage والمزيد
    • ‏114٫99 US$
    • ‏114٫99 US$

وصف الناشر

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security 
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

النوع
تخصصات مهنية وتقنية
تاريخ النشر
٢٠١٩
٢٤ ديسمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٣٢٠
الناشر
Wiley
البائع
John Wiley & Sons, Inc.
الحجم
١٨٫٣
‫م.ب.‬
Security and Privacy in Cyberspace Security and Privacy in Cyberspace
٢٠٢٢
Implementing and Leveraging Blockchain Programming Implementing and Leveraging Blockchain Programming
٢٠٢٢
Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
٢٠٢٢
Multimedia Technologies in the Internet of Things Environment, Volume 3 Multimedia Technologies in the Internet of Things Environment, Volume 3
٢٠٢٢
Recent Advancements in ICT Infrastructure and Applications Recent Advancements in ICT Infrastructure and Applications
٢٠٢٢
A Comprehensive Guide to 5G Security A Comprehensive Guide to 5G Security
٢٠١٨
Mobile Edge Computing and Communications Mobile Edge Computing and Communications
٢٠٢٤
Security and Privacy Vision in 6G Security and Privacy Vision in 6G
٢٠٢٣
6G Frontiers 6G Frontiers
٢٠٢٢
The Wiley 5G REF The Wiley 5G REF
٢٠٢١
Software Defined Mobile Networks (SDMN) Software Defined Mobile Networks (SDMN)
٢٠١٥