The Fifth International Conference on Safety and Security with IoT SaSeIoT 2021

This book presents the proceedings of the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits origin...

Full description

Bibliographic Details
Other Authors: Nayyar, Anand (Editor), Paul, Anand (Editor), Tanwar, Sudeep (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2023, 2023
Edition:1st ed. 2023
Series:EAI/Springer Innovations in Communication and Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03177nmm a2200349 u 4500
001 EB002017742
003 EBX01000000000000001180640
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220701 ||| eng
020 |a 9783030942854 
100 1 |a Nayyar, Anand  |e [editor] 
245 0 0 |a The Fifth International Conference on Safety and Security with IoT  |h Elektronische Ressource  |b SaSeIoT 2021  |c edited by Anand Nayyar, Anand Paul, Sudeep Tanwar 
250 |a 1st ed. 2023 
260 |a Cham  |b Springer International Publishing  |c 2023, 2023 
300 |a XII, 205 p. 73 illus., 64 illus. in color  |b online resource 
505 0 |a 1. Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables -- 2. On-Phone CNN Model-based Implicit Authentication to Secure IoT Wearables -- 3. A Cybersecurity Guide for Using Fitness Devices -- 4. An efficient algorithm for human abnormal behaviour detection using object detection and pose estimation -- 5. A Secure and Scalable IoT Consensus Protocol -- 6. Session Key Agreement Protocol for Secure D2D Communication -- 7. What Do Your Smart-Home Devices Reveal About You? -- 8. A Quantum-Resistant and Fast Secure Boot for IoT Devices Using Hash-Based Signatures and SRAM PUFs -- 9. On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before Deployment -- 10. Natural Scenes’ Text Detection and Recognition using CNN and Pytesseract -- 11. Assessing the Resistance of Internet of Things Applications Against Memory Corruption Attacks: A Case Study for Contiki and Tizen -- 12. IoT geography chain: Blockchain based solution for Logistics eco system 
653 |a Internet of things 
653 |a Telecommunication 
653 |a Communications Engineering, Networks 
653 |a Cooperating objects (Computer systems) 
653 |a Cyber-Physical Systems 
653 |a Internet of Things 
700 1 |a Paul, Anand  |e [editor] 
700 1 |a Tanwar, Sudeep  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a EAI/Springer Innovations in Communication and Computing 
028 5 0 |a 10.1007/978-3-030-94285-4 
856 4 0 |u https://doi.org/10.1007/978-3-030-94285-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.38 
520 |a This book presents the proceedings of the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT. Presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021) Includes tracks on security and management, IoT devices and Internet computing, cyber physical systems and artificial intelligence Supports research directions in the topics of security in IoT, wearable IoT and real time applications of IoT.