Internet of Things Vulnerabilities and Recovery Strategies

دانلود کتاب Internet of Things Vulnerabilities and Recovery Strategies

40000 تومان موجود

کتاب آسیب پذیری های اینترنت اشیا و استراتژی های بازیابی نسخه زبان اصلی

دانلود کتاب آسیب پذیری های اینترنت اشیا و استراتژی های بازیابی بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 5


توضیحاتی در مورد کتاب Internet of Things Vulnerabilities and Recovery Strategies

نام کتاب : Internet of Things Vulnerabilities and Recovery Strategies
ویرایش : 1
عنوان ترجمه شده به فارسی : آسیب پذیری های اینترنت اشیا و استراتژی های بازیابی
سری :
نویسندگان : , , , , ,
ناشر : Auerbach Publications
سال نشر : 2024
تعداد صفحات : 0
ISBN (شابک) : 1032473312 , 9781032473314
زبان کتاب : English
فرمت کتاب : rar    درصورت درخواست کاربر به PDF تبدیل می شود
حجم کتاب : 42 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
List of Contributors
Chapter 1 The Internet of Things (IoT): A Cripple to Data Privacy and Security
1.1 Defining the Internet of Things (IoT)
1.2 Role of Data in IoT
1.2.1 Defining Data
1.2.2 Data-Run Technology
1.3 Data Privacy and Security
1.3.1 Understanding Privacy
1.3.2 Data Privacy
1.3.3 Data Protection a Human Right
1.3.4 Data Protection in Other Jurisdictions
1.4 Challenges of Data Privacy and Security
1.5 Conclusion
References
Chapter 2 Cyber-Physical Threat Intelligence for IoT Using Machine Learning
2.1 Introduction
2.2 Related Work
2.2.1 MQTT: Threat Model
2.3 Research Methodology
2.4 Experimental Setup and Analysis
2.5 Results
2.5.1 Scenario 1: The Network Is in a Normal State (Transmission Delay and Energy Use)
2.5.2 Scenario 2: Attack On a System (WSN Operations to Find Anomalies)
2.6 Conclusions
References
Chapter 3 Privacy Preservation in Cyber Physical Systems Using Entropy-Based Techniques
3.1 Introduction
3.2 Privacy Domains
3.3 Related Work
3.4 Proposed Mechanism
3.5 Experimental Results
3.6 Future Directions
3.7 Conclusion
References
Chapter 4 Securing IoT Environment Using Bio-Inspired Meta-Heuristic Methodologies
4.1 Introduction
4.1.1 Security Issues in IoT
4.1.2 Literature Survey
4.2 Overview of the Proposed Work
4.2.1 Data Preprocessing
4.2.2 Recursive Feature Elimination
4.2.3 Feature Selection
4.2.4 Elephant Search Optimization
4.2.5 Chaotic Map Bat Optimization Algorithm
4.2.6 Hybrid Elephant and Chaotic Bat Optimization Algorithm (HECB_OA)
4.2.7 Ensemble Voting Classifier
4.2.7.1 Hard Voting
4.2.7.2 Soft Voting
4.3 Experimental Results
4.4 Conclusion
References
Chapter 5 Security of IoT and Its Solutions
5.1 Introduction
5.2 IoT Security-Critical Application Zones
5.3 Vulnerability Sources in IoT Applications
5.3.1 Adware, Spyware, and Other Viruses
5.3.2 Insufficient Efforts Made for Authentication and Authorization
5.3.3 Interference With the Body
5.3.4 Communication Routes That Are Not Protected
5.3.5 Insecure Data Storage
5.3.6 IoT Device Vulnerabilities
5.4 Security Challenges of IoT
5.5 Solutions for IoT Security
5.6 Conclusion
Chapter 6 A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices
6.1 Introduction
6.2 IoT Security Standards
6.3 Literature Study
6.4 Framework for Security Audit of IoT
6.5 Proposed Framework
6.5.1 Data Collection
6.5.2 Verification
6.5.3 Dashboard
6.6 Experimental Results
6.6.1 Experimental Results
6.7 Discussions
6.8 Conclusion
References
Chapter 7 Managing and Securing Information Storage in the Internet of Things
7.1 Introduction to Managing and Securing Information Storage in IoT
7.1.1 Importance of Information Storage in IoT
7.1.2 Challenges and Risks in IoT Data Storage
7.1.3 Overview of Security Concerns in IoT Storage
7.2 Storage Alternatives for IoT Data
7.2.1 Cloud Storage Solutions for IoT Data
7.2.2 Edge Storage Solutions for IoT Data
7.2.3 Hybrid Storage Approaches for IoT Data
7.3 Security Measures for IoT Data Storage
7.4 Backup and Disaster Recovery in IoT Storage
7.5 Data Integrity and Verification in IoT Storage
7.6 Future Trends and Challenges in IoT Storage
References
Chapter 8 Mitigation of Internet of Things: Cloud Security Challenges By Using Adaptive Security Principles
8.1 Introduction
8.2 Security Challenges Faced By IoT-Cloud
8.2.1 Data Breaches
8.2.2 Effective Data Management
8.2.3 Cloud Security
8.2.4 Malicious Intruders
8.2.4.1 IoT Security Issues
8.2.4.2 Cloud Computing Security Issues
8.3 Suggestive Model
8.3.1 Use of Secure Communication Protocols
8.3.2 Implement Access Control
8.3.3 Use Strong Authentication
8.3.4 Implement Secure Updates
8.3.5 Monitor and Analyze Data
8.3.6 Secure Storage and Backup
8.3.7 Consistent Security Audits
8.3.8 Prior Steps to Secure IoT-Cloud
8.4 Consult With Cloud IoT Providers About Their Most Recent Security Audits
8.4.1 Use the Security Choices That Cloud Service Providers Supply
8.4.2 Use the Cloud to Increase IoT Device Security
8.4.3 Fix the Roles and Responsibilities of the Cloud Vendor and Enterprise IT
8.4.4 Use the Cloud to Implement Security Measures
8.4.5 Channel Networks
8.5 Summarization
References
Chapter 9 IoT Security With Blockchain Technology in the Financial Sector
9.1 Introduction
9.2 Internet of Things (IoT)
9.3 Blockchain Technology
9.4 Characteristics of Blockchain Technology
9.5 Types of Blockchain
9.6 Challenges of IOT
9.7 Blockchain-Based Solutions for IoT Challenges
9.8 Conclusion and Suggestions
References
Chapter 10 Self-Adaptive Cyber-Physical Systems in IoT
10.1 Introduction to Self-Adaptive Cyber-Physical Systems in IoT
10.2 Overview of Cyber-Physical Systems
10.3 Characteristics and Challenges of IoT-Based Systems
10.4 Self-Adaptive Systems: Definition and Importance
10.5 Autonomic Computing for IoT-Based Systems
10.6 Machine Learning and AI Techniques for Self-Adaptive Systems
10.7 Control Theory and Dynamic Systems for Self-Adaptive Cyber-Physical Systems
10.8 Self-Optimization and Self-Configuration in IoT-Based Systems
10.9 Self-Healing and Self-Protection Mechanisms for IoT-Based Systems
10.10 Predictive Maintenance in IoT-Based Systems
10.11 Edge, Fog, and Cloud Computing for Self-Adaptive Cyber-Physical Systems
10.12 Big Data Analytics for Self-Adaptive Systems
10.13 Security and Privacy in Self-Adaptive Cyber-Physical Systems
10.14 Case Studies and Applications of Self-Adaptive Cyber-Physical Systems in IoT
10.15 Future Directions and Research Challenges in Self-Adaptive Cyber-Physical Systems in IoT
10.16 Conclusion
References
Chapter 11 The Internet of Things (IoT): Security and Privacy Issues in IoT and Its Solutions
11.1 Introduction
11.2 Security in IoT
11.2.1 Nest-Camera Hacker
11.2.2 A Flaw in Several Chrysler Models
11.3 Privacy in IoT
11.3.1 Bottom Line
11.4 IoT Security Solutions
11.4.1 Understanding the Architecture
11.4.2 Methods Used to Provide Security to IoT Devices
11.5 Conclusion
References
Chapter 12 The Dark Side of Internet of Things in E-Commerce: Uncovering the Misuse of Personal Information
12.1 IoT, Big Data and Data Mining – Meaning and Application
12.2 Big Data
12.3 Data Mining
12.4 Digital Marketing as a Tool in IoT
12.5 Obtaining the Right to Personal Data: Theory Versus Reality
12.6 Lack of Explicit Consent to Transfer Data
12.7 Profiling
12.8 Instances of Misuse of Personal Information
12.9 Alibaba Group Holdings
12.10 EBay Inc.
12.11 Target Corporation
12.12 Conclusion
12.13 Suggestions
References
Chapter 13 Intrusion Detection in Home Automation in IoT
13.1 Introduction
13.1.1 Overview of IoT and Home Automation Systems
13.1.2 Security Challenges in Home Automation
13.2 Importance of Intrusion Detection
13.2.1 Common IoT Security Threats and Vulnerabilities
13.2.2 Attack Trajectories
13.2.3 Risks Posed By Compromised Devices
13.3 Intrusion Detection Systems (IDS) in Home Automation
13.3.1 What Is an IDS and How Does It Work?
13.3.2 Types of IDS for Home Automation
13.3.3 Benefits of Using an IDS
13.4 Designing an IDS for Home Automation
13.4.1 Key Features to Consider
13.4.2 Integration With Other Security Systems
13.4.3 User Interface and Ease of Use
13.5 Implementing an IDS for Home Automation
13.5.1 Best Practices for Deployment
13.5.2 Challenges and Limitations
13.5.3 Examples of Successful Implementations
13.6 Case Study: Intrusion Detection in Smart Home Security Systems
13.6.1 Overview of Popular Smart Home Security Systems
13.6.2 Analysis of How IDS Can Enhance Security
13.6.3 Real-World Examples of Intrusion Detection in Action
13.7 Conclusion and Future Directions
13.7.1 Summary of Key Findings
13.7.2 Future Directions for Research and Development
13.7.3 Final Thoughts and Recommendations
References
Chapter 14 IoT Performance Assessment
14.1 IoT
14.1.1 Interoperability Evaluation
14.1.2 System Integration and Communication
14.1.3 Resource Utilization
14.1.4 Scalability and Flexibility
14.1.5 Problem Detection and Optimization
14.1.6 Service Level Agreement (SLA) Compliance
14.2 Technology in IoT
14.2.1 Representational State Transfer (REST)
14.2.2 Message Queuing Telemetry Transport (MQTT)
14.2.3 Extensible Messaging and Presence Protocol (XMPP)
14.2.4 Open Geospatial Consortium Sensor Web Enablement (OGC SWE)
14.2.5 Constrained Application Protocol (CoAP)
14.3 Performance Evaluation of IoT
14.3.1 Load Generation
14.3.2 Metrics Collection
14.3.3 Scalability Evaluation
14.3.4 Stability Evaluation
14.4 Case Studies: IoT Platforms
14.4.1 Insights
14.5 Conclusion
References
Chapter 15 Case Studies On IoT Systems Performance Analysis
15.1 Introduction
15.1.1 Why IoT Is Needed at All?
15.1.2 Case Study 1: Bearing Systems
15.1.3 Importance of Technology in the Life of the Common Man
15.1.4 Case Study 2: From Healthcare Sector
15.1.5 Case Study 3: From the Agriculture Sector
15.2 Existing IoT Infrastructure and Its Shortcomings
15.3 Key Features for IoT Repository to Mitigate the Shortcomings of IoT Infrastructure
15.4 Proposed Solution Architecture
15.4.1 Statement of the Problem
15.4.2 Objectives
15.4.3 Solution Architecture
15.5 Summary of the Proposed Solution
15.6 Technology Behind IoT
15.6.1 Some Key Technologies Behind IoT
15.7 Problem Analysis and Designing a Solution
15.8 To Analyze a Problem and Design a Solution for an IoT Project
Acknowledgement
References
Chapter 16 Privacy and Security Issues in Smart Homes in an IoT Environment
16.1 Introduction
16.2 Literature Review
16.3 Architecture
16.4 Security and Privacy in the IoT
16.5 Concerns With IoT Privacy Protection
16.5.1 User Privacy Violation Threats
16.5.2 Network/Devices Privacy Violation Threats
16.6 Security Attacks
16.7 Impact Evaluation
16.8 Security Challenges Smart Home Environment
16.9 Result and Discussion
16.10 Conclusion
References
Chapter 17 Enhancing Security: Detecting Intrusions in IoT-Based Home Automation
17.1 Introduction to Home Automation and IoT
17.1.1 Benefits of Home Automation and IoT
17.1.2 Challenges of Home Automation and IoT
17.1.3 Technologies Driving the Growth of Home Automation and IoT
17.2 Overview of Intrusion Detection Systems (IDS)
17.2.1 Types of IDS
17.2.2 Functions of IDS
17.2.3 Architectures of IDS
17.2.4 Strengths and Weaknesses of IDS
17.3 Intrusion Detection in Home Automation Systems
17.3.1 Types of Intrusions in Home Automation Systems
17.3.2 Challenges in Intrusion Detection for Home Automation Systems
17.3.3 Existing Intrusion Detection Approaches for Home Automation Systems
17.3.4 Strengths and Weaknesses of Existing Approaches
17.3.5 Challenges in Intrusion Detection for Home Automation Systems
17.4 Machine-Learning Techniques for Intrusion Detection in Home Automation Systems
17.4.1 ML Techniques for IDS in Home Automation Systems
17.5 Intrusion Detection System Designed for Home Automation
17.6 Conclusion
17.7 Future Work
References
Index




پست ها تصادفی