Login

Kamhoua, Charles A.

Modeling and Design of Secure Internet of Things

Kamhoua, Charles A. - Modeling and Design of Secure Internet of Things, ebook

136,40€

Ebook, ePUB with Adobe DRM
ISBN: 9781119593393
DRM Restrictions

Printing211 pages with an additional page accrued every 4 hours, capped at 211 pages
Copy to clipboard5 excerpts

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things

Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.

The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:

  • Presents information on game-theory analysis of cyber deception
  • Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation
  • Contains contributions from an international panel of experts
  • Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities

Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Keywords: game theoretic models; multi-domain battlefield settings; sdn-based network orchestration; addresses design issues; iot; data privacy explores; iot platforms synthesizes; target defense models; cyber deception models; attack surfaces, Mobile & Wireless Communications, Communication Technology - Networks, Communication System Security, Mobile & Wireless Communications, Communication Technology - Networks, Communication System Security

Editor
 
 
 
Publisher
John Wiley and Sons, Inc.
Publication year
2020
Language
en
Edition
1
Page amount
704 pages
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (ePUB)
9781119593393
Printed ISBN
9781119593362

Similar titles