Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Internet of Things: Security and Solutions Survey
by
Abdelgawad, Ahmed
, Yanambaka, Venkata P.
, Sadhu, Pintu Kumar
in
authentication framework
/ Backup software
/ blockchain
/ Case studies
/ Computer centers
/ cryptography
/ Decision making
/ Field programmable gate arrays
/ Global positioning systems
/ GPS
/ Information communication
/ Information sharing
/ Internet
/ Internet of Things
/ Medical equipment
/ physical unclonable function
/ Radio frequency identification
/ Review
/ security and privacy
/ Sensors
/ Social networks
/ Software
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Internet of Things: Security and Solutions Survey
by
Abdelgawad, Ahmed
, Yanambaka, Venkata P.
, Sadhu, Pintu Kumar
in
authentication framework
/ Backup software
/ blockchain
/ Case studies
/ Computer centers
/ cryptography
/ Decision making
/ Field programmable gate arrays
/ Global positioning systems
/ GPS
/ Information communication
/ Information sharing
/ Internet
/ Internet of Things
/ Medical equipment
/ physical unclonable function
/ Radio frequency identification
/ Review
/ security and privacy
/ Sensors
/ Social networks
/ Software
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Internet of Things: Security and Solutions Survey
by
Abdelgawad, Ahmed
, Yanambaka, Venkata P.
, Sadhu, Pintu Kumar
in
authentication framework
/ Backup software
/ blockchain
/ Case studies
/ Computer centers
/ cryptography
/ Decision making
/ Field programmable gate arrays
/ Global positioning systems
/ GPS
/ Information communication
/ Information sharing
/ Internet
/ Internet of Things
/ Medical equipment
/ physical unclonable function
/ Radio frequency identification
/ Review
/ security and privacy
/ Sensors
/ Social networks
/ Software
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Internet of Things: Security and Solutions Survey
2022
Request Book From Autostore
and Choose the Collection Method
Overview
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
Publisher
MDPI AG,MDPI
Subject
This website uses cookies to ensure you get the best experience on our website.