000 | 03558nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-16-1372-2 | ||
003 | DE-He213 | ||
005 | 20240423125410.0 | ||
007 | cr nn 008mamaa | ||
008 | 210603s2021 si | s |||| 0|eng d | ||
020 |
_a9789811613722 _9978-981-16-1372-2 |
||
024 | 7 |
_a10.1007/978-981-16-1372-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aWu, Chuan-Kun. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aInternet of Things Security _h[electronic resource] : _bArchitectures and Security Measures / _cby Chuan-Kun Wu. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2021. |
|
300 |
_aXIX, 245 p. 79 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF), _x2198-2694 |
|
505 | 0 | _a1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT. | |
520 | _aThis book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811613715 |
776 | 0 | 8 |
_iPrinted edition: _z9789811613739 |
776 | 0 | 8 |
_iPrinted edition: _z9789811613746 |
830 | 0 |
_aAdvances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF), _x2198-2694 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-16-1372-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177498 _d177498 |