Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures

Author:   Chinmay Chakraborty (BITS, India) ,  Sree Ranjani Rajendran (IIT Madras) ,  Muhammad Habibur Rehman (Khalifa Univ., Abu Dhabi)
Publisher:   Taylor & Francis Ltd
ISBN:  

9780367650490


Pages:   308
Publication Date:   31 August 2021
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $315.00 Quantity:  
Add to Cart

Share |

Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures


Add your own review!

Overview

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Full Product Details

Author:   Chinmay Chakraborty (BITS, India) ,  Sree Ranjani Rajendran (IIT Madras) ,  Muhammad Habibur Rehman (Khalifa Univ., Abu Dhabi)
Publisher:   Taylor & Francis Ltd
Imprint:   Chapman & Hall/CRC
Weight:   0.716kg
ISBN:  

9780367650490


ISBN 10:   0367650495
Pages:   308
Publication Date:   31 August 2021
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Securing Dedicated DSP Co-processors (Hardware IP) using Structural Obfuscation for IoT-oriented Platforms. Multi-bit True Random Number Generator for IoT devices using Memristor. Secured Testing of AES Cryptographic ICs for IoT Devices. Biometric-based Secure Authentication for IoT Enabled Devices and Applications. An improved verification scheme based on user biometrics. Obfuscation to Mitigate Hardware Attacks in the Edge Nodes of IoT System. Lightweight Security solutions for IoT using Physical Layer Key Generation. Threat and attack models in IoT devices. Review on Hardware attacks and security challenges in IoT Edge nodes. Study of Hardware attacks on Smart System Design Lab. A Novel Threat Modelling and Attack Analysis for IoT Applications. Trust management in Internet of Things devices

Reviews

Author Information

"Dr. Chinmay Chakraborty is an Assistant Professor (Sr.) in the Department of Electronics and Communication Engineering, BIT Mesra, India. His primary areas of research include Wireless body area network, Internet of Medical Things, point-of-care diagnosis, Wireless Networks, Telemedicine, m-Health/e-health, and Medical imaging. Dr.Sree Ranjani Rajendran is Passionate and curious researcher, in pursuit of knowledge and expertise in the broader domain of Hardware Security, with specific interest in ""Design for a secured hardware"".10+ Years of professional experience comprising research and university teaching. Presently, a Post-doctoral Researcher at the Indian Institute of Technology Madras, engaged in the ""Detection of Hardware Trojans in AES module using a Formal Verification method"". Dr.M. H. Rehman is currently working as a Research scientist at Khalifa University of Science and Technology in UAE. Overall, he has authored/co-authored 42 international publications including journal articles, conference proceedings, book chapters, and peer-reviewed magazine articles. His research interests include blockchain technologies, artificial intelligence, cyber-physical systems, differential privacy, big data, edge computing, and industrial IoT."

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List