Автор: S. Velliangiri, Sathish A.P. Kumar, P. Karthikeyan
Издательство: CRC Press
Год: 2021
Страниц: 223
Язык: английский
Формат: pdf (true)
Размер: 11.4 MB
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid.
This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain.
This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
Chapter 1 provides an introduction to IoT architecture and relevant security protocols. The chapter also discusses integration management and security protocols. Apart from this, the impending challenges in IoT security are also outlined with the latest developments leading to plausible insights for solutions.
Chapter 2 covers the essential aspects of security challenges and threats in IoT. Furthermore, the chapter discusses the three-layer architecture involving hardware communication protocols and a layer of services and applications, security, integrity, and hardware issues, challenges, threats, risks, and solutions involving the deployment of efficient privacy, control, authentication, and integration methods to confront various series of malicious cyberattacks.
Chapter 3 discusses the role of cryptography and its challenges in integrating secured IoT products. This chapter also discusses the main challenges of cryptography and future directions of cryptography in integrating secured IoT products.
Chapter 4 explains the convergence of significant paradigms like blockchain and IoT that includes security and interconnectivity to modernize things. Moreover, it discusses the challenges of implementing blockchain and its related security issues in IoT.
Chapter 5 describes how artificial intelligence and machine learning (AI/ML) technology is being used to discover, manage, monitor, and protect all devices on a network. Various ML methodologies are discussed, including centroid-based clustering, hierarchical clustering, and classification techniques such as random forest.
...
Chapter 12 describes the system to monitor the in-out activities of visitors to maintain the security of the laboratory and solve the occupancy detection problem.
The practical implementation of MQTT in IoT applications is discussed in Chapter 13. It is used to reduce transport overhead, protocol exchanges with minimized information, and network traffic, and it includes a mechanism to notify interested parties when an abnormal disconnection occurs.
Скачать Internet of Things: Integration and Security Challenges