دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Syed Rameem Zahra. Mohammad Ahsan Chishti
سری:
ISBN (شابک) : 9780367859947, 9781003016304
ناشر:
سال نشر: 2020
تعداد صفحات: 215
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 13 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Security and Privacy in the Internet of Things به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت و حریم خصوصی در اینترنت اشیا نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب یک مطالعه جامع از پیشرفتهای تحقیقاتی امنیت و حریم خصوصی در اینترنت اشیا (IoT) ارائه میکند. این کتاب با معرفی ویژگیهای ذاتی آسیبپذیر اینترنت اشیا زمینه بحث را فراهم میکند. این کتاب با ارائه یک بحث جامع از ویژگیهای آسیبپذیر، حوزههای مشکل IoT مرتبط با امنیت و حریم خصوصی را برجسته میکند. - تمام جنبه های امنیت را پوشش می دهد - الگوریتم ها، پروتکل ها و فناوری های مورد استفاده در اینترنت اشیا توضیح داده شده است و ایرادات امنیتی موجود در آنها با راه حل ها تجزیه و تحلیل شده است - راه های دستیابی به کنترل دسترسی بهتر و اعتماد به اکوسیستم اینترنت اشیا را مورد بحث قرار می دهد - به برنامه های استراتژیک جامع برای مقابله با امنیت کمک می کند. مسائل مربوط به اینترنت اشیا - جمع آوری کمک های محققان پیشرو از دانشگاه و صنعت برای فارغ التحصیلان، محققان، افراد صنعت و متخصصان امنیتی که می خواهند حوزه امنیت اینترنت اشیا را کشف کنند، این کتاب مفید خواهد بود. این کتاب بینش عمیقی در مورد آنچه اتفاق افتاده است، آنچه جدید اتفاق می افتد و فرصت های موجود در این زمینه ارائه می دهد.
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. - Covers all aspects of security - Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions - Discusses ways for achieving better access control and trust in the IoT ecosystem - Contributes exhaustive strategic plans to deal with security issues of IoT - Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Cover Half Title Title Page Copyright Page Table of Contents List of Abbreviations Preface List of Editors List of Contributors Chapter 1: Intrinsic Security and Privacy Vulnerabilities in the Internet of Things 1.1 Introduction 1.2 Security Issues Arising from Inherent IoT Features 1.3 Enabling Technologies of IoT and Their S&P Issues 1.3.1 Radio Frequency Identification (RFID) 1.3.2 Near Field Communication (NFC) 1.3.2.1 Wireless Sensor Networks (WSN) 1.3.3 Machine to Machine Communication (M2M) 1.3.4 Vehicle to Vehicle Communication (V2V) 1.3.5 Low Rate Wireless Personal Area Network 1.4 Infrastructure Protocols of IoT and Their S&P Issues 1.4.1 Routing Protocol for Low-power and Lossy Networks (RPL) 1.4.2 6LoWPAN 1.4.3 IEEE 802.15.4 1.5 Conclusion Notes References Chapter 2: Loopholes in IoT Security Services 2.1 Introduction 2.2 Insecure Web Interface 2.2.1 Account Enumeration 2.2.2 Weak Default Credentials 2.2.3 Cross-site Scripting (XSS) 2.2.4 SQL Injection 2.2.5 Session Management 2.2.6 Weak Account Lockout Settings 2.3 Ensuring Data Integrity 2.3.1 Triple DES 2.3.2 AES 2.3.3 RSA 2.4 Insecure Network Services 2.4.1 Vulnerable Services 2.4.2 Buffer Overflow 2.4.3 Open Ports via UPnP 2.4.4 Exploitable UDP Services 2.4.5 Denial of Service 2.4.6 DoS via Network Device Fuzzing 2.5 Lack of Transport Encryption 2.5.1 Unencrypted Services via the Internet 2.5.2 Unencrypted Services via the Local Network 2.5.3 Poorly Implemented SSL/TLS 2.5.4 Misconfigured SSL/TLS 2.6 Privacy Concerns 2.6.1 Security Risks 2.6.2 Privacy Risks 2.7 Insecure Software/Firmware 2.8 Poor Physical Security 2.9 Conclusion Note References Chapter 3: Physical Layer Security for Energy-Efficient IoT with Information and Power Transfer 3.1 Introduction 3.2 Secure and Energy-Efficient Information Transfer 3.3 Secure and Energy-Efficient Information and Power Transfer 3.4 General Case: Multiple Users and Multiple Eavesdroppers 3.5 Conclusion References Chapter 4: Blockchain Architecture for Securing the IoT 4.1 Need of a Decentralized Approach in the IoT 4.1.1 The Architecture of IoT in Centralized Approach and Security Levels 4.1.2 Decentralized Approach to Address Issues in Centralized Approach 4.2 Blockchain Technology 4.2.1 Fundamental Operations 4.2.2 Working of Blockchain 4.2.3 Features of Blockchain 4.2.4 Types of Blockchain 4.3 Application of Blockchain to IoT 4.4 Blockchain-Based Architecture for IoT Network 4.4.1 Field Devices 4.4.2 Intermediate (Mediator) Nodes 4.4.3 Translator Interfaces 4.4.4 Smart Contract 4.4.5 Miners 4.5 Blockchain-Based Architecture of IoT Network with Decentralized Cloud 4.5.1 Field Network 4.5.2 The Blockchain Network 4.5.3 Decentralized Cloud 4.5.4 Cloud Interface 4.6 Benefits of Blockchain to IoT 4.6.1 Fraud Proof 4.6.2 Low Cost 4.6.3 Decentralized Control 4.6.4 Security 4.6.5 Transparent Data 4.6.6 Device Autonomy 4.6.7 Distributed Ledger 4.7 Challenges to Application of Blockchain to IoT 4.8 A Case Study: Brooklyn Microgrid (BMG) 4.8.1 The Exergy Network 4.8.2 Working of Microgrid 4.9 Conclusion References Chapter 5: Reliable Data Transmission Using Biometric Authentication Methodology in IoT 5.1 Introduction 5.2 Literature Survey 5.3 Proposed Work 5.3.1 Notations Used in the Study 5.3.2 Assumptions Made in the Study 5.3.3 Proposed Health Monitoring System 5.4 Simulation 5.4.1 Energy Consumption 5.4.2 Communication Overhead 5.4.3 Reliability to Data 5.4.4 Security 5.5 Conclusion References Chapter 6: Novel Method for Detecting DDoS Attacks to Make Robust IoT Systems 6.1 Introduction: Background and Driving Forces 6.2 The IoT and ERP Environment 6.3 A Brief about Denial of Service (DoS) and Its Types 6.4 Related Work 6.5 Proposed Novel Method 6.6 The Algorithm ( Table 6.3) 6.7 Implementation of Algorithm and Observations 6.8 Conclusion and Future Scope Note References Chapter 7: Machine Learning for Enhancement of Security in Internet of Things Based Applications 7.1 Introduction 7.1.1 Main Contributions of This Proposal 7.2 Existing Security Solutions and Challenges Associated with Them 7.3 Security Aspects of IoT 7.3.1 Security Requirements 7.3.2 Security Challenges in IoT 7.3.3 Security Threats 7.3.3.1 Physical Attacks 7.3.3.2 Cyber-Attacks 7.4 Existing Machine Learning-Based Security Solutions for IoT along with Their Limitations and Challenges 7.4.1 Convolutional Neural Network (CNN) for Security Enhancement of IoT 7.4.2 K-Nearest Neighbor (KNN) for Security Enhancement of IoT 7.4.3 Support Vector Machines (SVMs) for Security Enhancement of IoT 7.5 Applications of Machine Learning and Deep Learning in IoT Based Network 7.6 Research Challenges and Future Directions in the Field of IoT Security Using Machine Learning and Deep Learning 7.7 Conclusion References Chapter 8: Open-Source Tools for IoT Security 8.1 Introduction to IoT Security Considerations 8.1.1 Security in IoT 8.1.1.1 Data Confidentiality 8.1.1.2 Privacy 8.1.1.3 Trust 8.2 Open-Source Operating Systems 8.2.1 RIOT 8.2.1.1 Security Services Provided by RIOT 8.2.2 Contiki 8.2.2.1 Security Services Provided by Contiki 8.2.3 FreeRTOS 8.2.3.1 Security Services Provided by FreeRTOS 8.2.4 TinyOS 8.2.4.1 Security Services Provided by TinyOS 8.3 Open-Source IoT Hardware Platforms 8.3.1 DeviceHive 8.3.1.1 Security Services Provided by DeviceHive 8.3.2 Distributed Services Architecture (DSA) 8.3.2.1 Security Services Provided by DSA 8.3.3 SiteWhere 8.3.3.1 Security Services Provided by SiteWhere 8.4 Open-Source IoT Middleware 8.4.1 Kaa 8.4.1.1 Security Services Provided by Kaa 8.4.2 OpenIoT 8.4.3 OpenRemote 8.5 Open-Source APIs 8.5.1 Zetta 8.5.2 BipIO 8.6 Discussion 8.7 Conclusion References Chapter 9: A Boolean Approach for Computational Design of Ethics 9.1 Introduction 9.2 Methodology 9.3 The Proposed Approach 9.4 Use Case 9.5 Discussion 9.6 Conclusion References Chapter 10: Security Solutions for Threats in IoT-Based Smart Vehicles 10.1 Introduction 10.2 Security Aspects of IoT and IoT-Based Smart Vehicles 10.2.1 Security Requirements in IoT-Based Smart Vehicles 10.2.2 Security Challenges in IoT-Based Smart Vehicles 10.3 Security Attacks and Threats in IoT and IoT-Based Smart Vehicles 10.3.1 Sybil Attack 10.3.2 Denial of Service (DoS) Attack 10.3.3 Black Hole Attack 10.3.4 Gray Hole Attack 10.3.5 Wormhole Attack 10.3.6 Man-in-the-Middle (MITM) Attack 10.3.7 Replay Attack 10.3.8 GPS (Global Positioning System) Attack 10.3.9 Node Impersonation Attack 10.3.10 Timing Attack 10.4 Security Solutions for Attacks in IoT-Based Smart Vehicles 10.4.1 Security Solutions to Sybil Attack 10.4.2 Security Solutions to DoS Attack 10.4.3 Security Solutions to Black Hole Attack 10.4.4 Security Solutions to Gray Hole Attack 10.4.5 Security Solutions to Wormhole Attack 10.4.6 Security Solutions to MITM Attack 10.4.7 Security Solutions to GPS Spoofing Attack 10.4.8 Security Solutions to Node Impersonation Attack 10.5 Discussions 10.6 Conclusion References Chapter 11: “Alexa, What about LGPD?”: The Brazilian Data Protection Regulation in the Context of the Mediatization of Virtual Assistants 11.1 Introduction 11.2 LGDP vs GDPR: Comparisons between Brazilian and European Data Protection Regulations 11.3 Brazilian Data Protection Regulations in the Context of Alexa Echo Dot's Privacy Policy 11.4 Conclusion Notes References Websites Chapter 12: Improving the Security of Data in the Internet of Things by Performing Data Aggregation Using Neural Network-Based Autoencoders 12.1 Introduction to the IoT and Smart City 12.2 Introduction to Neural Networks 12.3 Machine Learning and IoT 12.4 Need for Dimensionality Reduction 12.5 Autoencoders 12.6 Dimensionality Reduction with Autoencoders 12.6.1 Choice of Encoder and Decoder Functions 12.6.2 Choice of Loss Functions 12.7 Experimental Results 12.7.1 Denoising Autoencoders 12.8 Conclusion Acknowledgment References Appendices Appendix A: Wireless Communication Channel Modeling Appendix B: Wiretap Coding for Physical Layer Security Appendix C: Constrained Optimization and KKT Conditions Index