Books+ Search Results

Security and Privacy Issues in IoT Devices and Sensor Networks

Title
Security and Privacy Issues in IoT Devices and Sensor Networks / edited by Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath.
ISBN
0128232226
9780128232224
0128212551
9780128212554
Publication
London, United Kingdom ; San Diego, California : Academic Press, an imprint of Elsevier, [2021]
Physical Description
1 online resource (xvi, 318 pages) : illustrations
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies. The book highlights how these techniques can be applied to identify attacks and vulnerabilities, preserve privacy, and enhance data security. This in-depth reference is ideal for industry professionals dealing with WSN and IoT systems who want to enhance the security of these systems. Additionally, researchers, material developers and technology specialists dealing with the multifarious aspects of data privacy and security enhancement will benefit from the book's comprehensive information.
Variant and related titles
O'Reilly Safari. OCLC KB.
Other formats
Print version: Security and Privacy Issues in IoT Devices and Sensor Networks. London, United Kingdom ; San Diego, California : Academic Press, an imprint of Elsevier, [2021]
Format
Books / Online
Language
English
Added to Catalog
October 08, 2024
Series
Advances in ubiquitous sensing applications for healthcare ; v. 12.
Advances in ubiquitous sensing applications for healthcare ; volume 12
Bibliography
Includes bibliographical references and index.
Contents
Intro
Security and Privacy Issues in IoT Devices and Sensor Networks
Copyright
Contents
Contributors
Chapter 1: Wireless sensor networks: Concepts, components, and challenges
1. Introduction
1.1. Network design objective
1.2. Technological background
1.3. Network architecture
1.4. Classification of WSN
2. WSN communication pattern
2.1. Protocol stack of WSN
2.2. Medium access control at data link layer
2.3. Network layer
2.3.1. Routing protocol
2.4. Transport layer
3. WSN design challenges
2.4. Hotspot preventing routing (HPR)
2.5. RAIN
2.6. Thermal-aware shortest hop routing protocol (TSHR)
2.7. M-ATTEMPT
2.8. TMQoS
2.9. RE-ATTEMPT
2.10. M2E2 multihop routing protocol
2.11. Thermal aware-localized QoS routing protocol
2.12. Trust and thermal-aware routing protocol
2.13. Self-healing thermal-aware RPL routing protocol
2.14. Multipath ring routing protocol
3. Introduction about the thermal influence on medical WSN
3.1. Problems faced by recent scenario
3.2. Thermal influence on human tissue
3. Related work
4. Proposed work
4.1. Sensor communication between the sensor nodes
4.2. Encryption and decryption
4.3. Secure communication between sensor head to remote server
4.4. Secure data access in cloud server
5. Performance analysis
6. Summary
References
Chapter 4: Impact of thermal effects on wireless body area networks and routing strategies
1. Introduction
2. Thermal-aware routing protocols
2.1. Thermal-aware routing algorithm (TARA)
2.2. Least temperature rise (LTR)
2.3. Least total route temperature (LTRT)
4. Comparative analysis of optimized clustering algorithm
4.1. Cluster formation scenario
4.2. Optimized clustering strategy
5. Evaluation of clustering methods for optimization
5.1. Modeling of system
6. Result and analysis
7. Conclusion and future work
References
Chapter 2: Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access
1. Brief history of IoT communications related to multiple access technique
2. Basic fundamentals of NOMA
3. NOMA and application in cooperation network
4. NOMA and cognitive radio-assisted IoT system
4.1. System model of IoT relying NOMA and CR
4.2. Outage probability analysis in case of partial relay selection
4.2.1. Performance analysis of the first user
4.2.2. Outage probability at D2
5. Improving security at physical layer
6. Validating achievable expressions of outage behavior and secure performance via numerical simulation
7. Conclusion
References
Chapter 3: Security and privacy in wireless body sensor networks using lightweight cryptography scheme
1. Introduction
2. Motivation and objective of research
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?