logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals by Gupta, Brij B., Tewari, Aakanksha ISBN 9780367430696, 036743069X

  • SKU: EBN-11655086
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.7

9 reviews
Instant download (eBook) A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals after payment.
Authors:Gupta, Brij B., Tewari, Aakanksha
Pages:96 pages.
Year:2020
Editon:1
Publisher:CRC Press
Language:english
File Size:3.99 MB
Format:pdf
ISBNS:9780367430696, 036743069X
Categories: Ebooks

Product desciption

(Ebook) A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals by Gupta, Brij B., Tewari, Aakanksha ISBN 9780367430696, 036743069X

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products