| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910645892603321 |
|
|
Autore |
Meng Yan |
|
|
Titolo |
Security in Smart Home Networks / / by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (177 pages) |
|
|
|
|
|
|
Collana |
|
Wireless Networks, , 2366-1445 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Computer networks |
Data protection |
Computational intelligence |
Communications Engineering, Networks |
Computer Communication Networks |
Data and Information Security |
Computational Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the |
|
|
|
|
|
|
|
|
|
|
application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home’s security and privacy issues. |
|
|
|
|
|
| |