Internet of Things Security Architectures and Security Measures

This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between I...

Full description

Bibliographic Details
Main Author: Wu, Chuan-Kun
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2021, 2021
Edition:1st ed. 2021
Series:Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF)
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02597nmm a2200349 u 4500
001 EB001994363
003 EBX01000000000000001157265
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210702 ||| eng
020 |a 9789811613722 
100 1 |a Wu, Chuan-Kun 
245 0 0 |a Internet of Things Security  |h Elektronische Ressource  |b Architectures and Security Measures  |c by Chuan-Kun Wu 
250 |a 1st ed. 2021 
260 |a Singapore  |b Springer Nature Singapore  |c 2021, 2021 
300 |a XIX, 245 p. 79 illus., 29 illus. in color  |b online resource 
505 0 |a 1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4 Fundamentals of cryptography -- 5 Trust mechanism and key management in IoT -- 6 IoT perception layer security -- 7 IoT network layer security -- 8 IoT processing layer security -- 9 Privacy protection in IoT applications -- 10 RFID system security -- 11 On the IT security and the OT security in IoT -- 12 A comprehensive set of security measures for IoT. 
653 |a Mobile and Network Security 
653 |a Cryptography 
653 |a Computer networks—Security measures 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cyber-Physical Systems 
653 |a Cryptology 
653 |a Cooperating objects (Computer systems) 
653 |a Data and Information Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advances in Computer Science and Technology, In cooperation with the China Computer Federation (CCF) 
856 4 0 |u https://doi.org/10.1007/978-981-16-1372-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book presents a systematic and comprehensive overview for IoT security. It first introduces architecture approaches forIoT and IoT security, describing the security techniques for different layers in the IoT security architecture. It also provides anin-depth analysis on the difference between IoT security and traditional system and data security. It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system construction, many more security measuresneed to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of IoT. These security measures can serve as a source of reference for IoT system construction, as well as IoT security standard making