Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
- Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
- Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks
- Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT
- Contributed material by Dr. Imed Romdhani
|Product dimensions:||7.50(w) x 9.25(h) x (d)|
About the Author
Shancang Li is a senior lecturer in the cyber security research unit, Department of Computer Science and Creative Technologies at University of the West of England, Bristol, UK. Shancang previously worked as a lecturer in Edinburgh Napier University and a security researcher in cryptographic group at University of Bristol. In the past few years, he conducted mobile/digital forensics across a range of industries and technologies. His security background ranges from network penetration testing, wireless security, mobile security, and digital forensics.Li Da Xu is an IEEE Fellow and an academician of Russian Academy of Engineering. He is affiliated with Old Dominion University, Norfolk, Virginia, USA
Table of Contents
1. Introduction: Securing the Internet of Things 2. Security Architecture in the Internet of Things 3. Security and Vulnerability in the Internet of Things 4. IoT Node Authentication 5. Security Requirements in IoT Architecture 6. Security in Enabling Technologies 7. Existing Security Scheme for IoT 8. Security Concerns in Social IoT 9. Confidentiality and Security for IoT Based Healthcare