Amazon cover image
Image from Amazon.com

IoT security paradigms and applications : research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath

By: Material type: TextTextSeries: Computational intelligence in engineering problem solvingPublication details: Boca Raton CRC Press 2021Description: 335pISBN:
  • 9780367515003
Subject(s): DDC classification:
  • 005.83 SHA-S
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Copy number Status Date due Barcode Item holds
Books Books BITS Pilani Hyderabad 003-007 General Stack (For lending) 005.83 SHA-S (Browse shelf(Opens below)) GBP 52.99 Available 48493
Total holds: 0

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book

Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain
Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially concerned with IoT security
Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications
Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

There are no comments on this title.

to post a comment.
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 BITS-Library, BITS-Hyderabad, India.