LEADER 03115nam 2200541Ia 450 001 9910583340203321 005 20240505184645.0 010 $a0-12-804505-1 035 $a(CKB)3710000001018459 035 \\$a(Safari)9780128045053 035 $a(OCoLC)971244944 035 $a(PPN)198037090 035 $a(CaSebORM)9780128045053 035 $a(MiAaPQ)EBC4786871 035 $a(OCoLC)ocn971244944 035 $a(EXLCZ)993710000001018459 100 $a20170203d2017 uy 0 101 0 $aeng 135 $aurunu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring the internet of things /$fShancang Li, Li Da Xu ; Imed Romdhani, contributor 205 $a1st edition 210 1$aCambridge, MA :$cSyngress,$d[2017] 210 4$dİ2017 215 $a1 online resource (1 volume) $cillustrations 311 $a0-12-804458-6 320 $aIncludes bibliographical references and index. 327 $aAbout the Authors -- Introduction: Securing the Internet of Things -- Security Architecture in the Internet of Things -- Security and Vulnerability in the Internet of Things IoT Node Authentication -- Security Requirements in IoT Architecture -- Security in Enabling Technologies -- Existing Security Scheme for IoT -- Security Concerns in Social IoT -- Confidentiality and Security for IoT Based Healthcare -- Index 330 $aSecuring the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT Contributed material by Dr. Imed Romdhani 606 $aInternet of things 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aInternet of things. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a004.67/8 676 $a005.8 700 $aLi$b Shancang$0876570 702 $aXu$b Li D. 702 $aRomdhani$b Imed 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910583340203321 996 $aSecuring the internet of things$91957360 997 $aUNINA