Ubiquitous Computing and Computing Security of IoT

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in t...

Full description

Bibliographic Details
Other Authors: Jeyanthi, N. (Editor), Abraham, Ajith (Editor), Mcheick, Hamid (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2019, 2019
Edition:1st ed. 2019
Series:Studies in Big Data
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02077nmm a2200373 u 4500
001 EB001853013
003 EBX01000000000000001017316
005 00000000000000.0
007 cr|||||||||||||||||||||
008 181102 ||| eng
020 |a 9783030015664 
100 1 |a Jeyanthi, N.  |e [editor] 
245 0 0 |a Ubiquitous Computing and Computing Security of IoT  |h Elektronische Ressource  |c edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick 
250 |a 1st ed. 2019 
260 |a Cham  |b Springer International Publishing  |c 2019, 2019 
300 |a V, 127 p. 47 illus., 25 illus. in color  |b online resource 
505 0 |a Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future 
653 |a Big data 
653 |a Computational intelligence 
653 |a Artificial Intelligence 
653 |a Computational Intelligence 
653 |a Data protection 
653 |a Artificial intelligence 
653 |a Big Data 
653 |a Data and Information Security 
700 1 |a Abraham, Ajith  |e [editor] 
700 1 |a Mcheick, Hamid  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Studies in Big Data 
028 5 0 |a 10.1007/978-3-030-01566-4 
856 4 0 |u https://doi.org/10.1007/978-3-030-01566-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future