LEADER 00748nam0-22003011i-450- 001 990003293000403321 005 20001010 035 $a000329300 035 $aFED01000329300 035 $a(Aleph)000329300FED01 035 $a000329300 100 $a20000920d1905----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>EXTREME-ORIENT 210 $aParis$cPages Libres$d1905 215 $app.124 610 0 $aCina; Giappone; Russia 676 $a097.003 700 1$aMetin,$bAlbert$0130335 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003293000403321 952 $a097.003.MET$b15462$fDECGE 959 $aDECGE 996 $aEXTREME-ORIENT$9446317 997 $aUNINA DB $aING01 LEADER 03911nam 22006735 450 001 9910645892603321 005 20230117154721.0 010 $a3-031-24185-1 024 7 $a10.1007/978-3-031-24185-7 035 $a(MiAaPQ)EBC7179471 035 $a(Au-PeEL)EBL7179471 035 $a(CKB)26027649400041 035 $a(DE-He213)978-3-031-24185-7 035 $a(PPN)267809344 035 $a(EXLCZ)9926027649400041 100 $a20230117d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Smart Home Networks /$fby Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (177 pages) 225 1 $aWireless Networks,$x2366-1445 311 08$aPrint version: Meng, Yan Security in Smart Home Networks Cham : Springer International Publishing AG,c2023 9783031241840 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. 330 $aThis book presents the security and privacy challenges of the smart home following the logic of ?terminal device ? voice interface ? application platform?. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home?s security and privacy issues. 410 0$aWireless Networks,$x2366-1445 606 $aTelecommunication 606 $aComputer networks 606 $aData protection 606 $aComputational intelligence 606 $aCommunications Engineering, Networks 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aComputational Intelligence 615 0$aTelecommunication. 615 0$aComputer networks. 615 0$aData protection. 615 0$aComputational intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aComputational Intelligence. 676 $a929.605 676 $a643.60285 700 $aMeng$b Yan$01275813 702 $aZhu$b Haojin 702 $aShen$b Xuemin (Sherman) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910645892603321 996 $aSecurity in Smart Home Networks$93251594 997 $aUNINA