Adaptive Security for the Internet of Things
Syngress Media,U.S. (Verlag)
978-0-12-801627-5 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
The book assembles relating topics into a coherent body of knowledge consisting of theories, case studies, examples, and open problems, and builds on a set of formal and practical links to highlight the impact of the context on all the processes of the adaptive security engineering lifecycle, including an exploration of the idea that adaptive security should rely on an accurate representation of the dynamic context encompassing threats, energy level, and security requirements.
In addition, the book provides information on studying and analyzing the trade-off between security effectiveness and energy-efficiency. Researchers and practitioners will find a complete framework for the concepts and research being conducted around IoT security.
Dr. Habtamu Abie is currently a Senior Research Scientist at the Norwegian Computing Center. He received his B.Sc., M.Sc. and Ph.D. in computer science from the University of Oslo and has many years of experience in computing, both as practitioner and researcher. He has a strong and extensive background in the design and development of real-time systems, and the design, modelling and development of security for distributed object computing systems. He has previously been senior engineer and research scientist at Telenor Research and Development, scientific associate and fellow at CERN, researcher at ABB Corporate Research, software development engineer at Nera-AS, and Alcatel Telecom Norway. His past and present research interests encompass adaptive security (risk management, protocols, DRM, IDM, requirements, metrics, policy, privacy, trust) in distributed and telecommunications systems, architecture and methodology, formal methods and tools, hard real-time systems, and mobile, ubiquitous and ambient intelligent computing. He has served as guest-editor of the Special Issue on Security of Wireless Communication Systems of the Journal of Networks and serves as a project proposal reviewer for research and higher academic institutions such as The Natural Sciences and Engineering Research Council of Canada, and Province of British Columbia Natural Resources and Applied Sciences (NRAS). He has also been engaged in building large consortia and leading technical R&D work, both in industry-driven and multinational projects. Currently, Dr. Abie works on privacy risk assessment methods for identity management in the PETweb II (Privacy-respecting Identity Management for e-Norge) project, and on the information security properties, trustworthiness, security functions and privacy implications of the IoT in the uTRUSTit (Usable TRUST in the Internet of Things - FP7) project. He is the principal scientist and project manager of the ASSET (Adaptive Security for Smart Internet of Things in eHealth) project, which researches and develops risk-based adaptive security methods and mechanisms for IoT in eHealth using game theory and context-awareness that increase security to an appropriate level.
Chapter 1: IoT Security Challenges and Requirements
Chapter 2: Vulnerabilities and Threats for the IoT
Chapter 3: Standards and Practices for IoT Security
Chapter 4: Lightweight Cryptosystems for the IoT
Chapter 5: Adaptive Risk Management, Risk Analysis, and Risk Assessment for the IoT
Chapter 6: Identity Management, Authentication, and Anonymity in the IoT
Chapter 7: Resiliency and Security-Effectiveness in the IoT
Chapter 8: Security of Wearable and Implantable Body Area Networks
Chapter 9: Practical Implementation of Security Mechanisms for the IoT
Chapter 10: Distributed Monitoring for Adaptive Security in the IoT
Chapter 11: Context-Aware Threat Analysis for the IoT
Chapter 12: Formal Specification and Validation of Adaptive Security Policies for the IoT
Chapter 13: Game Theory and Applications to Adaptive Security for the IoT
Chapter 14: Learning Techniques for Real-Time Reaction to Security Attacks in the IoT
Chapter 15: Metrics for Adaptive Security in the IoT
Chapter 16: Verification and Testing of Adaptive Security Controls in the IoT
Chapter 17: Cross-Layer Design for Energy-Effective Security Mechanisms in the IoT
Chapter 18: Adaptive Authorization and Access Control Policies for the IoT
Chapter 19: Adaptive Security Engineering for the IoT
| Erscheint lt. Verlag | 15.1.2017 |
|---|---|
| Zusatzinfo | Approx. 100 illustrations; Illustrations, unspecified |
| Verlagsort | Rockland, MA |
| Sprache | englisch |
| Maße | 191 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 0-12-801627-2 / 0128016272 |
| ISBN-13 | 978-0-12-801627-5 / 9780128016275 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich