Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks
Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT
Contributed material by Dr. Imed Romdhani
Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...
Mobile Cloud Computing: Models, Implementation, and Security
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.
The book begins with an overview of mobile...