|
|
|
|
LEADER |
03805nam a22005775i 4500 |
001 |
978-981-16-1372-2 |
003 |
DE-He213 |
005 |
20210621195102.0 |
007 |
cr nn 008mamaa |
008 |
210603s2021 si | s |||| 0|eng d |
020 |
|
|
|a 9789811613722
|9 978-981-16-1372-2
|
024 |
7 |
|
|a 10.1007/978-981-16-1372-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Wu, Chuan-Kun.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Internet of Things Security
|h [electronic resource] :
|b Architectures and Security Measures /
|c by Chuan-Kun Wu.
|
250 |
|
|
|a 1st ed. 2021.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2021.
|
300 |
|
|
|a XIX, 245 p. 79 illus., 29 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2686
|
505 |
0 |
|
|a 1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT.
|
520 |
|
|
|a This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
0 |
|a Embedded computer systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cyber-physical systems, IoT.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/T24080
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811613715
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811613739
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811613746
|
830 |
|
0 |
|a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF),
|x 2198-2686
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-16-1372-2
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|