IoT security paradigms and applications : research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath
Material type: TextSeries: Computational intelligence in engineering problem solvingPublication details: Boca Raton CRC Press 2021Description: 335pISBN:- 9780367515003
- 005.83 SHA-S
Item type | Current library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|---|
Books | BITS Pilani Hyderabad | 003-007 | General Stack (For lending) | 005.83 SHA-S (Browse shelf(Opens below)) | GBP 52.99 | Available | 48493 |
Browsing BITS Pilani Hyderabad shelves, Shelving location: General Stack (For lending), Collection: 003-007 Close shelf browser (Hides shelf browser)
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book
Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain
Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially concerned with IoT security
Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications
Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
There are no comments on this title.