Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg
What people are saying - Write a review
We haven't found any reviews in the usual places.
Trust and Authentication
IoT Data Security
Other editions - View all
6LoWPAN access control adversary algorithm applications approach architecture central servers certificate Chen color communication components Computer connected consumption context contributor cooperative authentication credential cryptographic data aggregation data privacy defined denoted deployment detection distributed dynamic embedded enabler encryption energy entity environment Equation evaluation example framework function global hash hoc networks identify identity IEEE infected informed consent infrastructure integrity International Conference Internet of Things IoT devices IoT service IPv6 layer location privacy malware malware propagation mechanism MixGroup OBUs optimal path privacy-preserving proposed protocol pseudonym pseudonym entropy pseudonym exchange public key query plan random reputation request RFID scheme security and privacy sensor nodes signal smart building smart grid smart meter smartphones social SocIoTal storage nodes strategy Sybil attack target technologies timestamp tion traffic transmission trust update uploaded data utility valid VANET vehicle vehicular WBSN wireless sensor networks