ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Security and Privacy Issues in IoT Devices and Sensor Networks

دانلود کتاب مسائل مربوط به امنیت و حریم خصوصی در دستگاه های اینترنت اشیا و شبکه های حسگر

Security and Privacy Issues in IoT Devices and Sensor Networks

مشخصات کتاب

Security and Privacy Issues in IoT Devices and Sensor Networks

دسته بندی: شبکه سازی
ویرایش:  
نویسندگان: , ,   
سری: Advances in Ubiquitous Sensing Applications for Healthcare 
ISBN (شابک) : 0128212551, 9780128212554 
ناشر: Academic Press 
سال نشر: 2020 
تعداد صفحات: 315 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 50,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Security and Privacy Issues in IoT Devices and Sensor Networks به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مسائل مربوط به امنیت و حریم خصوصی در دستگاه های اینترنت اشیا و شبکه های حسگر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مسائل مربوط به امنیت و حریم خصوصی در دستگاه های اینترنت اشیا و شبکه های حسگر



مسائل امنیت و حریم خصوصی در دستگاه‌های اینترنت اشیا و شبکه‌های حسگر مسائل مربوط به نقض امنیت در شبکه‌های اینترنت اشیا و حسگر را بررسی می‌کند و راه‌حل‌های مختلف را بررسی می‌کند. این کتاب یک رویکرد دوگانه را دنبال می‌کند، ابتدا بر مبانی و تئوری پیرامون شبکه‌های حسگر و امنیت اینترنت اشیا تمرکز می‌کند. سپس راه‌حل‌های عملی را بررسی می‌کند که می‌توانند برای توسعه امنیت این عناصر پیاده‌سازی شوند و مطالعات موردی را برای افزایش درک ارائه می‌کنند. تکنیک‌های یادگیری ماشین و همچنین پارادایم‌های امنیتی دیگر، مانند فناوری‌های امنیت ابری و ارزهای دیجیتال، پوشش داده شده‌اند. این کتاب نشان می دهد که چگونه می توان از این تکنیک ها برای شناسایی حملات و آسیب پذیری ها، حفظ حریم خصوصی و افزایش امنیت داده ها استفاده کرد.

این مرجع عمیق برای متخصصان صنعت که با سیستم‌های WSN و IoT سر و کار دارند و می‌خواهند امنیت این سیستم‌ها را افزایش دهند، ایده‌آل است. علاوه بر این، محققان، توسعه دهندگان مواد و متخصصان فناوری که با جنبه های مختلف حفظ حریم خصوصی داده ها و ارتقای امنیت سروکار دارند، از اطلاعات جامع کتاب بهره مند خواهند شد.


توضیحاتی درمورد کتاب به خارجی

Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies. The book highlights how these techniques can be applied to identify attacks and vulnerabilities, preserve privacy, and enhance data security.

This in-depth reference is ideal for industry professionals dealing with WSN and IoT systems who want to enhance the security of these systems. Additionally, researchers, material developers and technology specialists dealing with the multifarious aspects of data privacy and security enhancement will benefit from the book's comprehensive information.



فهرست مطالب

Front-Matter_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw
	Front Matter
Copyright_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Network
	Copyright
Contributors_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw
	Contributors
Chapter-1---Wireless-sensor-networks--C_2021_Security-and-Privacy-Issues-in-
	Wireless sensor networks: Concepts, components, and challenges
		Introduction
			Network design objective
			Technological background
			Network architecture
			Classification of WSN
		WSN communication pattern
			Protocol stack of WSN
			Medium access control at data link layer
			Network layer
				Routing protocol
			Transport layer
		WSN design challenges
		Comparative analysis of optimized clustering algorithm
			Cluster formation scenario
			Optimized clustering strategy
		Evaluation of clustering methods for optimization
			Modeling of system
		Result and analysis
		Conclusion and future work
		References
Chapter-2---Secure-performance-of-emerging-wi_2021_Security-and-Privacy-Issu
	Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access
		Brief history of IoT communications related to multiple access technique
		Basic fundamentals of NOMA
		NOMA and application in cooperation network
		NOMA and cognitive radio-assisted IoT system
			System model of IoT relying NOMA and CR
			Outage probability analysis in case of partial relay selection
				Performance analysis of the first user
				Outage probability at D2
		Improving security at physical layer
		Validating achievable expressions of outage behavior and secure performance via numerical simulation
		Conclusion
		References
Chapter-3---Security-and-privacy-in-wireless_2021_Security-and-Privacy-Issue
	Security and privacy in wireless body sensor networks using lightweight cryptography scheme
		Introduction
		Motivation and objective of research
		Related work
		Proposed work
			Sensor communication between the sensor nodes
			Encryption and decryption
			Secure communication between sensor head to remote server
			Secure data access in cloud server
		Performance analysis
		Summary
		References
Chapter-4---Impact-of-thermal-effects-on-w_2021_Security-and-Privacy-Issues-
	Impact of thermal effects on wireless body area networks and routing strategies
		Introduction
		Thermal-aware routing protocols
			Thermal-aware routing algorithm (TARA)
			Least temperature rise (LTR)
			Least total route temperature (LTRT)
			Hotspot preventing routing (HPR)
			RAIN
			Thermal-aware shortest hop routing protocol (TSHR)
			M-ATTEMPT
			TMQoS
			RE-ATTEMPT
			M2E2 multihop routing protocol
			Thermal aware-localized QoS routing protocol
			Trust and thermal-aware routing protocol
			Self-healing thermal-aware RPL routing protocol
			Multipath ring routing protocol
		Introduction about the thermal influence on medical WSN
			Problems faced by recent scenario
			Thermal influence on human tissue
			Wireless communication technologies for data transfer in WBAN
			Sources of energy consumption
			Specific absorption rate (SAR)
		Proposed protocol (OPOTRP)
			OPOTRP functional procedure
				Initialization stage
				Relay node selection
				Assigning priority level for data in sensor node
				Alternative relay node selection
			Optimal temperature selection
		Results and discussion
			Simulation parameters
			Variation in temperature at different times
			Average power consumption
			Network lifetime analysis
			Different data priority signal
			Heating ratio
			Data delivery delay
		Conclusion
		References
Chapter-5---Four-way-binary-tree-base_2021_Security-and-Privacy-Issues-in-Io
	Four-way binary tree-based data gathering model for WSN
		Introduction
		Literature survey
		Network model
			Energy dissipation radio model
			Network characteristics
			Proposed (virtual 4-way full binary tree) structure
			Setup of the network
			Working of the proposed scheme
				Initial phase
				Active phase
				Dying phase
			Flow charts
		Result analysis
		Advantages of the proposed scheme
		Conclusion
		References
Chapter-6---Routing-protocols--Key-security-_2021_Security-and-Privacy-Issue
	Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks
		Introduction
		The security issues, challenges and requirements
			Network security and requirements
			Security issues and challenges
		Classification of attacks
			Based on the attackers location
			Based on tempering with data
		Attacks and countermeasures on different layers
			Physical-layer attacks
			Data-link layer attacks
			Networks layer attacks
			Transport layer attacks
			Application layer attacks
			Multilayer attacks
			Denial of service (DoS) attacks
		Survey of security issues, threats and defense mechanisms in IoT
			Wormhole attack and its counter measure
			Classification of wormhole attacks
			Wormhole detecting and avoiding models
		Proposed solutions and analysis
			Transmission time-based wormhole detection
				Route reply by the destination
				RTT calculations
			TTWD model
				TTWD algorithm
				Route discovery
		Computation of RTT in TTWD
		Simulation and experimental evaluation
			Simulation environment
			Network simulator parameters
			Simulation results
				Simulation-scenario 1
				Simulation-scenario 2
				Simulation-scenario 3
				Simulation-scenario 4
		Conclusion and future directions
		References
Chapter-7---Fault-tolerance-of-cluster-based-_2021_Security-and-Privacy-Issu
	Fault tolerance of cluster-based nodes in IoT sensor networks with periodic mode of operation
		Introduction
		Related works
		Mathematical background and main symbols and definitions
		Models formulation and solution
			Model 1. Sensor with diagnostics in active mode
			Model 2. Sensor with diagnostics in active mode and periodical diagnostics in the sleep mode
				Numerical example
			Model 3. Sensors with mix architecture of backup batteries
		Results and discussions
		Conclusions
		References
Chapter-8---Lightweight-cryptographic-algorit_2021_Security-and-Privacy-Issu
	Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks
		Introduction
			Methodology
			Chapter organization
		Related work
		Preliminaries
			Resource constrained environment- internet of things (IoT)
				Phases of IoT system
				Architectural layers of IoT
			Implementation of lightweight block ciphers for IoT applications
		Lightweight cryptographic primitives
			Lightweight block ciphers
			Lightweight stream ciphers
			Lightweight hash functions
			Lightweight message authentication codes
		Proposed methodology
			Hardware analysis metrics
			Algorithm of KLEIN lightweight block cipher
				Pipelined architecture of KLEIN lightweight block cipher
				Parallel architecture of KLEIN lightweight block cipher
				Unrolled architecture of KLEIN lightweight block cipher
			Simulation results
			Results and discussions
		Performance comparison of conventional and lightweight cryptographic algorithms for IoT
		Conclusion
		References
Chapter-9---EELC--Energy-efficient-ligh_2021_Security-and-Privacy-Issues-in-
	EELC: Energy-efficient lightweight cryptography for IoT networks
		Introduction-IoTSec
			Cyberattacks
			Security challenges in IoT
		Literature survey
		Energy-efficient lightweight cryptography (EELC) architecture
			Energy efficient subkey generation
			LMGF algorithm
				Algorithm
			Mathematical model for MAC
			Flow of OMGF
			Hardware requirement
			Robustness of OMGF
			Energy efficient encryption
			Working of EEE
			Energy efficient decryption
		Performance evaluation
			Time complexity analysis
			Analysis based on energy
			Security attacks
				Brute force attack
				Cryptanalysis
		Conclusion
		Further reading
Chapter-10---Blockchain-as-a-solution-for-_2021_Security-and-Privacy-Issues-
	Blockchain as a solution for security attacks in named data networking of things
		Introduction
		Security attacks in NDN of things (NDNoT)
			Cache misappropriation
			Interest flooding
			Selfish irruption
			Data phishing
			Miscellaneous irruptions
		Blockchain in NDNoT
			Blockchain basics
			Blockchain architecture
			Key features of design of blockchain
		Security investigation of NDN blockchain of things
			AES128 algorithm
		Types of blockchain
		The need for using a Blockchain in IoT
		BIoT applications
		Existing issues of applications of blockchain IoT
		Further issues and recommendations of blockchain in IoT
		Conclusion
		References
Chapter-11---A-novel-privacy-preserving-hea_2021_Security-and-Privacy-Issues
	A novel privacy-preserving healthcare information sharing platform using blockchain
		Introduction
		Literature review
		Overview of blockchain
		System model
			Overview
			Patient uploading medical data
			Provider uploading medical data of his/her patient
			Provider sharing medical data with another provider
			Provider querying medical data of patient
			Patient updating access given to provider
		Analysis
		Conclusion
		References
Chapter-12---Computational-intelligent-techniq_2021_Security-and-Privacy-Iss
	Computational intelligent techniques for prediction of environmental attenuation of millimeter waves
		Introduction
			Atmosphere
			Composition of atmosphere
		Terrestrial and satellite links
			Attenuation due to gas
			Attenuation caused by snow
			Attenuation due to hail
			Attenuation due to dust
			Attenuation due to scintillation
		Cloud attenuation
			Cloud attenuation model
			Work done by other researchers
		Rain attenuation
			ITU-R model
			Simple attenuation model
			García-López method
			Model proposed by Brazil
			RAL model
		Rain attenuation in terrestrial links
		Implementation results of rain model
		Issues related to machine learning
		Conclusion
		References
Chapter-13---The-role-of-IoT-in-smart-cities--C_2021_Security-and-Privacy-Is
	The role of IoT in smart cities: Challenges of air quality mass sensor technology for sustainable solutions
		Introduction
		Background of air quality monitoring sensors in urban environments
			Regulation-based air quality monitoring
				Ambient particulate monitoring
				Ambient gas monitoring
			IoT-based air quality monitoring
				MSU and LCS monitoring
				Crowdsourcing and citizen science
			Evaluation of regulation- and IoT-based air quality sensor technology
			Applications of urban air quality data
		Challenges of air quality monitoring and management in urban environments
			Lack of spatial variability
			Environmental challenges
			Crowdsourcing and citizen science challenges
			Lack of transparency
				IoT-based air quality monitoring trial programs
		Applications, initiatives, and future direction
			Integration of sensor data and passive crowdsourced data
			Air quality data application framework
				Practical applications
				Strategic applications
				Legislative application
			Smart city digital twinning
		Discussion and findings
		Conclusion
		References
Index_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Networks
	Index




نظرات کاربران