IoT security: advances in authentication
"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it...
Gespeichert in:
Weitere beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc.
2020
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119527923/?ar |
Zusammenfassung: | "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119527947 1119527945 9781119527961 1119527961 9781119527923 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-058895701 | ||
003 | DE-627-1 | ||
005 | 20240228121143.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781119527947 |c epub |9 978-1-119-52794-7 | ||
020 | |a 1119527945 |9 1-119-52794-5 | ||
020 | |a 9781119527961 |c adobe pdf |9 978-1-119-52796-1 | ||
020 | |a 1119527961 |9 1-119-52796-1 | ||
020 | |a 9781119527923 |9 978-1-119-52792-3 | ||
035 | |a (DE-627-1)058895701 | ||
035 | |a (DE-599)KEP058895701 | ||
035 | |a (ORHE)9781119527923 | ||
035 | |a (DE-627-1)058895701 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/3 |2 23 | |
245 | 0 | 0 | |a IoT security |b advances in authentication |c edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c 2020 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher | ||
520 | |a "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- | ||
650 | 0 | |a Internet of things |x Security measures | |
650 | 4 | |a Internet des objets ; Sécurité ; Mesures | |
700 | 1 | |a Liyanage, Madhusanka |e HerausgeberIn |4 edt | |
700 | 1 | |a Braeken, An |d 1970- |e HerausgeberIn |4 edt | |
700 | 1 | |a Kumar, Pardeep |d 1976- |e HerausgeberIn |4 edt | |
700 | 1 | |a Ylianttila, Mika |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781119527923 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119527923 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119527923/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-058895701 |
---|---|
_version_ | 1829007749794496512 |
adam_text | |
any_adam_object | |
author2 | Liyanage, Madhusanka Braeken, An 1970- Kumar, Pardeep 1976- Ylianttila, Mika |
author2_role | edt edt edt edt |
author2_variant | m l ml a b ab p k pk m y my |
author_facet | Liyanage, Madhusanka Braeken, An 1970- Kumar, Pardeep 1976- Ylianttila, Mika |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)058895701 (DE-599)KEP058895701 (ORHE)9781119527923 |
dewey-full | 005.8/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/3 |
dewey-search | 005.8/3 |
dewey-sort | 15.8 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03049cam a22004692c 4500</leader><controlfield tag="001">ZDB-30-ORH-058895701</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121143.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527947</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-119-52794-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119527945</subfield><subfield code="9">1-119-52794-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527961</subfield><subfield code="c">adobe pdf</subfield><subfield code="9">978-1-119-52796-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119527961</subfield><subfield code="9">1-119-52796-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527923</subfield><subfield code="9">978-1-119-52792-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058895701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP058895701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119527923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058895701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">IoT security</subfield><subfield code="b">advances in authentication</subfield><subfield code="c">edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets ; Sécurité ; Mesures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liyanage, Madhusanka</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Braeken, An</subfield><subfield code="d">1970-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Pardeep</subfield><subfield code="d">1976-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ylianttila, Mika</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119527923</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119527923</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119527923/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-058895701 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:15Z |
institution | BVB |
isbn | 9781119527947 1119527945 9781119527961 1119527961 9781119527923 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | IoT security advances in authentication edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila Hoboken, NJ John Wiley & Sons, Inc. 2020 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Internet of things Security measures Internet des objets ; Sécurité ; Mesures Liyanage, Madhusanka HerausgeberIn edt Braeken, An 1970- HerausgeberIn edt Kumar, Pardeep 1976- HerausgeberIn edt Ylianttila, Mika HerausgeberIn edt 9781119527923 Erscheint auch als Druck-Ausgabe 9781119527923 |
spellingShingle | IoT security advances in authentication Internet of things Security measures Internet des objets ; Sécurité ; Mesures |
title | IoT security advances in authentication |
title_auth | IoT security advances in authentication |
title_exact_search | IoT security advances in authentication |
title_full | IoT security advances in authentication edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila |
title_fullStr | IoT security advances in authentication edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila |
title_full_unstemmed | IoT security advances in authentication edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila |
title_short | IoT security |
title_sort | iot security advances in authentication |
title_sub | advances in authentication |
topic | Internet of things Security measures Internet des objets ; Sécurité ; Mesures |
topic_facet | Internet of things Security measures Internet des objets ; Sécurité ; Mesures |
work_keys_str_mv | AT liyanagemadhusanka iotsecurityadvancesinauthentication AT braekenan iotsecurityadvancesinauthentication AT kumarpardeep iotsecurityadvancesinauthentication AT ylianttilamika iotsecurityadvancesinauthentication |