A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem

A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem

V S Saranya

35,59 €
IVA incluido
Consulta disponibilidad
Editorial:
Draft2Digital
Año de edición:
2024
ISBN:
9781835800942
Añadir a favoritos

IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet connection. Back to back COVID -19 pandemic periods are challenging for various industries related to healthcare, retail, automotive and manufacturing. However, IoT technology played a very important role in meeting the needs of business and customers. All the industries are evolved as smart because of the arrival of IoT. This integrated Artificial Intelligence technology and big data applied to tackle mass flooding of data in this 21st century. Various IoT devices and data centers are connected together to form IoT as an intelligent network. IoT devices are considered as connected devices which provide data analysis by making use of sensors. Number of sensors is massive and they rely on power consumption and connectivity. There are possibilities for security and privacy breaches in IoT ecosystem as more amount of confidential and sensitive information is shared. Most of the IoT devices are independent and works with less human intervention. Few IoT devices are built with exclusive authentication-based identification. Primary feature of IoT device is minimal energy consumption which affords data collection and sharing in remote areas. IoT utilization is increased in AI, cloud computing, big data and smart systems like smart cities, smart offices and smart homes. A typical IoT system is defined with three primary steps which are data collection, data transfer and data analysis. First step is referred as physical layer where sensors and microcontrollers are used for collecting and diffusing data. IoT network components like hub or gateway are utilized for data transfer in second step. In third step, data analysis is implemented by consisting user interface and cloud like back end system. Violation occurrences in any of these three steps will reveal sensitive information of connected IoT devices. Several vulnerable exploitations are implied towards IoT devices because of its poor encryption and authentication system.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
    Disponible

    258,62 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    73,25 €

  • Batch Verification of Digital Signatures in IoT
    Apurva S. Kittur
    Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be defined in many ways. ’Internet’ refers to the interconnectivity of devices to create a network, and ’Things’ refers to the embedded objects or devices that can connect to the Internet. One way of defining is, ’it is a network of sensors and smart devices which sense the data which is further processed and ana...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    393,00 €