Smart City Gnosys

Smart city article details

Title Security And Privacy In The Internet Of Things: Architectures, Techniques, And Applications
ID_Doc 47865
Authors Awad A.I.; Abawajy J.
Year 2021
Published Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
DOI http://dx.doi.org/10.1002/9781119607755
Abstract SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: • Discusses a broad range of IoT attacks and defense mechanisms • Examines IoT security and privacy protocols and approaches • Covers both the logical and physical security of IoT devices • Addresses IoT security through network traffic modeling • Describes privacy preserving techniques in smart cities • Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment. © 2022 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
4300 View0.939Abiodun O.I.; Abiodun E.O.; Alawida M.; Alkhawaldeh R.S.; Arshad H.A Review On The Security Of The Internet Of Things: Challenges And SolutionsWireless Personal Communications, 119, 3 (2021)
47934 View0.931Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47858 View0.915Chanal P.M.; Kakkasageri M.S.Security And Privacy In Iot: A SurveyWireless Personal Communications, 115, 2 (2020)
47885 View0.914Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)
47868 View0.914Tolani M.; Balodi A.; Bajpai A.; Jain V.; Kovintavewat P.Security And Privacy Issues For Iot And Wsn-Based Real-Time ApplicationsSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
47990 View0.909Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
32899 View0.904Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
33253 View0.904Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
47854 View0.902Sikdar B.Security And Privacy For The Internet Of ThingsInternational Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2020-October (2020)
47880 View0.9Lu Y.Security And Privacy Of Internet Of Things: A Review Of Challenges And SolutionsJournal of Cyber Security and Mobility, 12, 6 (2023)