Название: Security in IoT: The Changing Perspective Автор: Rituparna Chaki, Debdutta Barman Roy Издательство: CRC Press Год: 2022 Страниц: 136 Язык: английский Формат: pdf (true), epub (true) Размер: 12.8 MB
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things.
There are several definitions of IoT. One of them is as follows: An open and comprehensive network of intelligent objects that has the capacity to auto organize, share information, data and resources, reacting and acting in face of situations and changes in the environment. We can consider IoT as a worldwide network which allows communication between things–things, things–human and human–human. In short, it is a communication network that connects everything in the world. Things can perceive the physical features of their environment with their sensors and share the obtained data with other things on the network. In addition, they can control their environment with actuators.
The communication medium used in DCC applications was private, so it was difficult to access this network from outside. In addition, the equipment used was application-specific and was developed for industrial use, so its reliability was high. Similarly, the software used was developed sufficiently reliably. The communication techniques and protocols used in DCC were developed specifically for the application and were extremely robust in terms of security.
Security issues are listed below, and detailed information is given in the upcoming sections:
• Communication medium and protocol • Hardware and software • Weakness against cyberattacks • Monitoring devices • Data protection • Autonomous systems
IoT uses the Internet as a communication medium; therefore, it is open and vulnerable to attacks. In order to make the communication over the Internet more reliable, some special protocols and techniques are added to find a better solution.
Guidance from the Author Organization Acknowledgments Chapter 1 Security of IoT Chapter 2 Robustness Analysis of PLC Programs with Respect to Sensor Interaction in IoT Chapter 3 Machine Ethics Aspects in the Internet of Things Chapter 4 An Intrusion Detection System for WSN Layer of IoT Chapter 5 An NLP-Based Scheme for User Data Security from Overprivileged IoT Apps Index
Optimal Localization of Internet of Things Nodes Название: Optimal Localization of Internet of Things Nodes Автор: Sheetal N Ghorpade, Marco Zennaro Издательство: Springer Год: 2022 Страниц: 129...
Big Data-Enabled Internet of Things Название: Big Data-Enabled Internet of Things (Computing and Networks) Автор: Muhammad Usman Shahid Khan (Editor), Samee U. Khan (Editor), Albert Y....