Security in IoT: The Changing Perspective

Автор: literator от 5-05-2023, 19:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security in IoT: The Changing PerspectiveНазвание: Security in IoT: The Changing Perspective
Автор: Rituparna Chaki, Debdutta Barman Roy
Издательство: CRC Press
Год: 2022
Страниц: 136
Язык: английский
Формат: pdf (true), epub (true)
Размер: 12.8 MB

The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things.

There are several definitions of IoT. One of them is as follows:
An open and comprehensive network of intelligent objects that has the capacity to auto organize, share information, data and resources, reacting and acting in face of situations and changes in the environment. We can consider IoT as a worldwide network which allows communication between things–things, things–human and human–human. In short, it is a communication network that connects everything in the world. Things can perceive the physical features of their environment with their sensors and share the obtained data with other things on the network. In addition, they can control their environment with actuators.

The communication medium used in DCC applications was private, so it was difficult to access this network from outside. In addition, the equipment used was application-specific and was developed for industrial use, so its reliability was high. Similarly, the software used was developed sufficiently reliably. The communication techniques and protocols used in DCC were developed specifically for the application and were extremely robust in terms of security.

Security issues are listed below, and detailed information is given in the upcoming sections:

• Communication medium and protocol
• Hardware and software
• Weakness against cyberattacks
• Monitoring devices
• Data protection
• Autonomous systems

IoT uses the Internet as a communication medium; therefore, it is open and vulnerable to attacks. In order to make the communication over the Internet more reliable, some special protocols and techniques are added to find a better solution.

Contents:


Скачать Security in IoT: The Changing Perspective




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.