000 04051nam a22005175i 4500
001 978-981-15-9942-2
003 DE-He213
005 20240423125431.0
007 cr nn 008mamaa
008 210127s2021 si | s |||| 0|eng d
020 _a9789811599422
_9978-981-15-9942-2
024 7 _a10.1007/978-981-15-9942-2
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aTang, Qinghao.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInternet of Things Security: Principles and Practice
_h[electronic resource] /
_cby Qinghao Tang, Fan Du.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aIX, 288 p. 206 illus., 129 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPart 1 Basics and analysis methods for IoT System -- 1 The Analysis on Hardware -- 2 The Analysis on Wireless Communication -- 3 Basic Knowledge of Firmware -- 4 Analysis of Firmware Vulnerabilities -- Part 2 Defense methods for Industrial IoT System -- 5 IoT Security -- 6 IoT Security Solution.
520 _aOver the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks,Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they shared let the public become more aware of IoT device security-related risks. Currently, many IoT product suppliers have begun hiring equipment evaluation services and purchasing security protection products. As a direct participant in the IoT ecological security research project, I would like to introduce the book to anyone who is a beginner that is willing to start the IoT journey, practitioners in the IoT ecosystem, and practitioners in the security industry. This book provides beginners with key theories and methods for IoT device penetration testing; explains various tools and techniques for hardware, firmware and wireless protocol analysis; and explains how to design a secure IoT device system, while providing relevant code details.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 0 _aInternet of things.
650 1 4 _aMobile and Network Security.
650 2 4 _aData and Information Security.
650 2 4 _aInternet of Things.
700 1 _aDu, Fan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811599415
776 0 8 _iPrinted edition:
_z9789811599439
856 4 0 _uhttps://doi.org/10.1007/978-981-15-9942-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177891
_d177891