توضیحاتی در مورد کتاب Security and Privacy in Cyberspace
نام کتاب : Security and Privacy in Cyberspace
عنوان ترجمه شده به فارسی : امنیت و حریم خصوصی در فضای مجازی
سری : Blockchain Technologies
نویسندگان : Omprakash Kaiwartya, Keshav Kaushik, Sachin Kumar Gupta, Ashutosh Mishra, Manoj Kumar
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 228
ISBN (شابک) : 9789811919596 , 9789811919602
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Contents
Taxonomy of Security Attacks on Internet of Things
1 Introduction
2 State of IoT Security
3 Taxonomy of Security Attacks on IoT
4 Attacks on IoT Devices
5 IoT Industrial Security
6 Use Case: Secure Vehicular Traffic Control Using IoT
7 Conclusion
References
Cyber Threats, Attack Strategy, and Ethical Hacking in Telecommunications Systems
1 Introduction
2 Ethical Hacking
2.1 Ethical Hacking Subtypes
3 Cryptography and Protocols
4 Safety Standards: Risk Analysis Methods
4.1 Security Policy
4.2 Standard Comparison
5 Attack Strategy [4]
5.1 External Reconnaissance: Analyzing Before Attacking
5.2 Passive Recognition
5.3 Active Recognition
5.4 Attack on the Network
6 Conclusion
References
Blockchain-Based Solutions for Cybersecurity: Architecture, Applications, and Review
1 Introduction
2 Blockchain-Based Architecture for Improved Cyber Security Solutions
3 Blockchain Solutions for Cybersecurity
4 Future Prospects
References
Blockchain and IoT Unanimity in a Smart Metropolitan Development
1 Introduction
2 Role of Big Data and IoT with Blockchain
3 Data Management in IoT
4 Outline of IoT-Based Decentralized Access Control System
5 Role of Humans
6 Concepts and Services of Smart City
7 Smart City Resolutions—A Case Study
8 Proposed Framework of IoT Implementation in Smart City management—A Pilot Study
9 Conclusion
References
Internet of X-Enabled Intelligent Unmanned Aerial Vehicles Security for Hyper-connected Societies
1 Introduction
2 Wireless Communication Systems: A Global Connectivity
2.1 Terrestrial System Against Space-Based Systems
2.2 Comparison and Open Issues
3 Intelligent UAVs Network Configurations for Hyper-connected Societies and Security
3.1 A Standalone UAV Topology
3.2 An Integrated Terrestrial-UAV Topology
3.3 A Heterogenous Terrestrial-UAV-Satellite Topology
4 Security of UAV to IoX
5 Concluding Discussions and Recommendations
References
A Secure Bank Transaction Using Blockchain Computing and Forest Oddity
1 Introduction
2 Potential Banking Systems Intrusions
2.1 Data Breach
2.2 Malware
2.3 Index Spoofing
3 Blockchain Contribution for Intrusion Prevention
4 Authentication Mechanism
5 Problem Statement
6 Proposed Approach
6.1 Key Generation by SHA-2
6.2 Redarc Algorithm for Data Encryption
6.3 Optimization Blowfish Algorithm
7 Results
8 Conclusion
References
Distributed Ledger Technology: Use Cases, Design, and Implementation Issues
1 Introduction
2 Background
3 Assessment and Questionnaires
4 Role of DLT/Blockchain in Financial Services
5 Use Case and Scenarios
6 Modeling into DLT-Based Network
6.1 Managing Computational Resources
6.2 Estimation of the Finality of the Transaction
7 Issues Related to DLT Implementation
7.1 Managing Distributed Nodes in Terms of Storage Cost
7.2 Managing Distributed Nodes in Terms of Processing Cost
7.3 Consensus Selection for Decentralized Business Use Cases
7.4 Finality of Transaction in Near to Real-Time Latency
8 Framework and Simulation
8.1 Network Benchmarking
9 Summary
References
Internet of Things (IoT) System Security Vulnerabilities and Its Mitigation
1 Introduction
1.1 IoT in Everyday Life
1.2 IoT in Healthcare
1.3 IoT in Agriculture
2 Related Work
3 Introduction to IoT Security
4 Why IoT Systems Are at Risk?
5 Methodology
5.1 MQTT Protocol
5.2 CoAP Protocol
5.3 AMQP
5.4 XMPP
5.5 WebSocket
6 Essentials in IoT Security
7 General Mitigation Techniques
8 IoT Security—Home Surveillance Systems
9 Conclusion
References
Detection of Phishing Attacks on Online Collaboration Tools Using Logistic Regression
1 Introduction
2 Machine Learning Methods Used Logistic Regression: Use of Algorithm for the Development of the Model
3 Literature Survey
4 Proposed System
5 Accuracy Test
6 Data Flow Diagram (D F D)
6.1 Model Implementation
7 Conclusions
References
Security Analysis of Unmanned Aerial Vehicle for Mars Exploration
1 Introduction
1.1 Motivation and Contribution
1.2 Expected Application Area
2 Related Work
2.1 Types of UAVs for Space Investigation
3 Security Threats, Protocols, and Security Solutions for UAVs for Space Exploration
3.1 Protocols for Space Missions
3.2 Attacks and Incidents of Communication
3.3 Security Solutions in Space UAV Network
4 System Model and Simulation Results
4.1 Environmental Conditions
4.2 Sensors Block
5 Conclusion
References
Hybrid Beamforming for Secured mmWave MIMO Communication
1 Introduction
2 Analog Beamforming
3 Digital Beamforming
4 Hybrid Beamforming
5 Overview of mmWave MU-MIMO
5.1 mmWave MU-MIMO System
5.2 mmWave MU-MIMO Channel Model
5.3 mmWave MU-MIMO Channel Sparsity
5.4 Beamspace Representation
5.5 Beam Selection
5.6 Zeroforcing Precoding (ZF)
5.7 mmWave Beamspace MU-MIMO System Capacity
6 Conclusion
References
Blockchain Enabled Vehicle Anti-theft System
1 Introduction
2 Materials and Methods
2.1 Node MCU 1.0 (ESP-12E ESP8266 Wi-Fi Module)
2.2 Touch Sensor
2.3 NEO-6M GPS Module
2.4 PIR Sensor (Passive Infrared Sensor)
2.5 ESP32 Camera Module
2.6 Vibration Sensor sw-420
2.7 Detection of Intruder
2.8 Hardware Implementation
2.9 Software Implementation
3 Results and Discussions
3.1 Vibration Sensor
3.2 Touch Sensor
3.3 Movement Detection by GPS
3.4 PIR and Camera Sensors Module
4 Application of Blockchain Technology for Vehicle Theft Prevention
5 Conclusions
References
512605_1_En_BookFrontmatter_OnlinePDF.pdf
512605_1_En_1_Chapter_OnlinePDF.pdf