000 03558nam a22006015i 4500
001 978-981-16-1372-2
003 DE-He213
005 20240423125410.0
007 cr nn 008mamaa
008 210603s2021 si | s |||| 0|eng d
020 _a9789811613722
_9978-981-16-1372-2
024 7 _a10.1007/978-981-16-1372-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aWu, Chuan-Kun.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInternet of Things Security
_h[electronic resource] :
_bArchitectures and Security Measures /
_cby Chuan-Kun Wu.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXIX, 245 p. 79 illus., 29 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
_x2198-2694
505 0 _a1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT.
520 _aThis book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
650 0 _aData protection.
650 0 _aCooperating objects (Computer systems).
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks
_xSecurity measures.
650 1 4 _aData and Information Security.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aCryptology.
650 2 4 _aMobile and Network Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811613715
776 0 8 _iPrinted edition:
_z9789811613739
776 0 8 _iPrinted edition:
_z9789811613746
830 0 _aAdvances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
_x2198-2694
856 4 0 _uhttps://doi.org/10.1007/978-981-16-1372-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177498
_d177498