Fr. 249.00

IoT Security - Fundamentals and Key Enabling Technologies

English · Paperback / Softback

Will be released 01.10.2025

Description

Read more










IoT Security: Fundamentals and Key Enabling Technologies explores the complex interactions between Internet of Things (IoT) and the pressing need for effective cyber security solutions. Diving into real-world case studies to provide insights into implementing efficient security measures that safeguard against online dangers, this book comprehensively analyzes the challenges and possibilities presented by intelligent technologies fueling transformational change, emphasizing the crucial role cybersecurity plays in defending networks, data, and user privacy in an increasingly interconnected digital ecosystem.

Coverage includes cryptographic methods, communication networks, device identity and access, data governance and privacy, as well as regulatory frameworks and standards for IoT security. Computer science researchers and engineers will benefit from this compilation of cutting-edge research and practical case studies, learning how to minimize risks for IoT and intelligent technologies.

List of contents










Chapter 1: Next-Generation IoT Security: Machine Learning and AI Perspectives

Chapter 2: Image-Based Steganography in IIoT: Enhancing Data Security with CNN, CBAM, and Quantization Techniques

Chapter 3: Securing Patient Data in IoT-Enabled Medical Imaging: A Steganographic Approach

Chapter 4: A Multifactor-based Secure and Efficient Protocol for Authentication and key Key-management in Industrial Internet-of-Things

Chapter 5: Human Factors and Social Engineering in IoT Attacks

Chapter 6: Machine Learning Approaches for Strengthening IoT Security: A Thorough Review

Chapter 7: Modern Privacy Preserving Strategies for IoT Security

Chapter 8: Identity and Access Management for IOT Devices

Chapter 9: A Comprehensive Study on ECC-Based Secure IEEE 802.15.4 Connectivity in IoT Gateways

Chapter 10: Securing MAVLink Communication in the Internet of Drones Using Elliptic Curve Cryptography

Chapter 11: Contemporary Threats and Countermeasures for IoT Systems

Chapter 12: Secure and Efficient Communication for MQTT-based IoT Systems

Chapter 13: Safeguarding Crop Quality: IoT-Enabled Pest Classification via Convolution Neural Network and Transfer Learning

Chapter 14: Leveraging Self-Sovereign Identities for User-Centric Identity Management in Internet of Things

Chapter 15: Securing IoT-Based Pancreatic Cancer Management Systems with Elliptic Curve Cryptography

Chapter 16: Emerging Trends and Security in IoT Devices

Chapter 17: Collaborative Security approaches for IoT Ecosystems

Chapter 18: IoT-Based Cardiovascular Health Monitoring: Ensuring Security with Machine Learning and AI Techniques

Chapter 19: Progressions and Unfilled Gaps in Homomorphic Encryption for Emerging Application Areas: A Comprehensive Literature Review and Preface
Chapter 20: A Short Study on Robotics in Smart Homes: Developing a Robotic Assistant for Everyday Tasks

Chapter 21: Homomorphic Encryption for Modern Data Security: Case Studies of IBM’s Comprehensive Solutions and Zama’s Cutting-Edge Innovations for IoT

Chapter 22: From Needs to Insights: User Stories Guide Data Processing and Networking for IDMS Development for IOT

Chapter 23: IoT Security Through Machine Learning And AI

Chapter 24: The role of IOT in optimising quick commerce operations: a comprehensive analysis of micro-fulfillment centers and consumer satisfaction

Chapter 25: Securing the Future: Challenges and Threats in IoT Device Security

About the author

SK Hafizul Islam received Ph.D. (CSE) from IIT (ISM) Dhanbad, India, under the INSPIRE Fellowship Ph.D. Program (funded by the DST, Government of India). He is currently an Assistant Professor at IIIT Kalyani, West Bengal, India. Before joining the IIIT Kalyani, he was an Assistant Professor at the BITS Pilani, Rajasthan, India. He has authored or co-authored 125 research papers in journals and conference proceedings of international reputes. His research interests include Information Security, Lattice-based Cryptography, IoT & Blockchain Security, and Deep Learning. He is an Associate Editor for "IEEE J-BHI", "IEEE T-ITS", "IEEE Systems Journal", "IEEE Access", “IJCS (Wiley)”, “Telecommunication Systems (Springer)", "IET Wireless Sensor Systems", “Journal of Cloud Computing (Springer)”, and Technical Committee Member for “Computer Communications (Elsevier)”. He is the recipient of the University Gold Medal, the S. D. Singha Memorial Endowment Gold Medal, and the Sabitri Parya Memorial Endowment Gold Medal from Vidyasagar University, in 2006. He was also the recipient of the University Gold Medal from IIT(ISM) Dhanbad in 2009.Debabrata Samanta is an Assistant Professor & Program Head, at the Department of Computing and Information Technologies, Rochester Institute of Technology, Kosovo, Europe. He obtained his Ph.D. in Computer Science and Engg. in the area of SAR Image Processing. He is keenly interested in Interdisciplinary Research and development and has experience spanning fields of SAR Image Analysis, Video surveillance, a Heuristic algorithm for Image Classification, Deep Learning Framework for Detection and Classification, Blockchain, Statistical Modelling, Wireless Adhoc Networks, Natural Language Processing. He has successfully completed six Consultancy Projects. He owns 22 Patents (4 Design Indian Patents and 2 Australian patents Granted, 16 Indian Patents published) and 2 copyrights. He has authored or co-authored over 224 research papers; he has co-authored 13 books and co-edited 13 books. He has presented various papers at international conferences and received Best Paper awards. He is an IEEE Senior Member, an Associate Life Member of the Computer Society of India (CSI), and a Life Member of the Indian Society for Technical Education (ISTE).Arup Kumar Pal is an Associate Professor in the Department of Computer Science and Engineering, Indian Institute of Technology (Indian School of Mines) Dhanbad, India. Before joining this institute, he was a lecturer in the Department of Computer Science and Engineering, NIT Jamshedpur, from April 2011 to December 2011. He received his BTech in Computer Science and Engineering from Government College of Engineering and Textile Technology, Berhampore, India, in 2006. He did his Ph.D. in Computer Science and Engineering from IIT (ISM) Dhanbad in 2011. He has more than Nine years of teaching and research experience. He has contributed over 70 research papers in several journals and conference proceedings of national and international reputes. His main research interest includes Data Compression, Multimedia Security, and CBIR. He has organized several FDP in the area of Image Processing and Cryptography. He has served as an Advisor Committee member and Technical Programme Committee (TPC) member in various conferences/workshops etc.Ummer Iqbal received a Bachelor of Engineering in Computer Science and Engineering from Dayananda Sagar College, Vishweriaya Technical University Bangalore, in 2007. He completed his M.Tech and Ph.D. from NIT Srinagar in 2015 and 2022. He joined NIELIT Srinagar/Jammu in 2010 as Scientist 'B'. He has accumulated a total experience of around 13 years, and his job profile includes teaching IT, Information Security, and Cyber Forensics at the P.G. level at NIELIT Srinagar/Jammu. His research & development interest is IoT security, Information Security and Open-source technologies.

Product details

Assisted by Arup Kumar Pal (Editor), Ummer Iqbal (Editor), Debabrata Samanta (Editor), SK Hafizul Islam (Editor)
Publisher Elsevier
 
Languages English
Product format Paperback / Softback
Release 01.10.2025
 
EAN 9780443341250
ISBN 978-0-443-34125-0
Series Hybrid Computational Intelligence for Pattern Analysis and Understanding
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

machine learning, Artificial Intelligence, COMPUTERS / Artificial Intelligence / General

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.