You are previewing Security Solutions for Hyperconnectivity and the Internet of Things.
O'Reilly logo
Security Solutions for Hyperconnectivity and the Internet of Things

Book Description

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Foreword
    1. REFERENCES
  7. Preface
    1. ORGANIZATION OF THIS BOOK
  8. Acknowledgment
  9. Chapter 1: Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
    1. ABSTRACT
    2. INTRODUCTION
    3. HYPERCONNECTIVITY
    4. INTERNET OF THINGS
    5. WEB OF THINGS
    6. INTERNET OF EVERTHING
    7. BODY HACKING AND ENHANCEMENT
    8. SECURITY AND PRIVACY
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  10. Chapter 2: Internet of Things Research Challenges
    1. ABSTRACT
    2. INTRODUCTION
    3. IoT-WSN APPLICATIONS
    4. IoT IDENTIFICATION CHALLENGES
    5. SECURITY AND PRIVACY CHALLENGES
    6. INTEROPERABILITY CHALLENGES
    7. MANAGEMENT CHALLENGES
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  11. Chapter 3: Security Solutions for Intelligent and Complex Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. DISCUSSION
    4. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    5. ACKNOWLEDGMENT
    6. REFERENCES
    7. ENDNOTES
  12. Chapter 4: Privacy and Security
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. KEY ELEMENTS OF IoT
    5. IoT DATA STORAGE
    6. CONCLUSION AND FUTURE DIRECTIONS
    7. REFERENCES
  13. Chapter 5: Enhancing Cyber Security for Financial Industry through Compliance and Regulatory Standards
    1. ABSTRACT
    2. CYBERSECURITY COMPLIANCE IN THE FINANCIAL SECTOR
    3. CONCLUSION
    4. REFERENCES
  14. Chapter 6: Prevention of Blackhole Attack using Certificateless Signature (CLS) Scheme in MANET
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. PROPOSED WORK
    5. PERFORMANCE EVALUATION
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  15. Chapter 7: Trust Management in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. TRUST MANAGEMENT
    4. DEFINITION OF TRUST
    5. IMPORTANCE OF TRUST MANAGEMENT
    6. TRUST MANAGEMENT CHARACTERISITICS IN CLOUD
    7. TASKS OF A TRUST MANAGEMENT SYSTEM
    8. TRUST MANAGEMENT TECHNIQUES
    9. POLICY AS A TRUST MANAGEMENT TECHNIQUE (PocT)
    10. RECOMMENDATION AS A TRUST MANAGEMENT TECHNIQUE (RecT)
    11. REPUTATION AS A TRUST MANAGEMENT TECHNIQUE (RepT)
    12. PREDICTION AS A TRUST MANAGEMENT TECHNIQUE (PrdT)
    13. TRUST AND REPUTATION MODELS
    14. TRUST MANAGEMENT SYSTEM FOR CLOUD COMPUTING
    15. DEPENDENCE OF CLOUD ENTITIES ON SOURCES OF EVIDENCE FOR TRUST JUDGEMENT
    16. SUMMARY
    17. REFERENCES
  16. Chapter 8: Security and Trust in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. VIRTUALIZATION AND CLOUD COMPUTING
    4. SYSTEM VIRTUALIZATION
    5. SECURITY IN CLOUD COMPUTING
    6. TRUST IN CLOUD COMPUTING
    7. DEVELOPMENT OF CLOUD SERVICES
    8. CONCLUSION AND FUTURE RESEARCH
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  17. Chapter 9: Security Issues in Distributed Computing System Models
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DISTRIBUTED COMPUTING SYSTEM MODELS
    5. SECURITY ISSUES IN DISTRIBUTED SYSTEMS
    6. SECURITY ATTACKS ON DISTRIBUTED SYSTEMS
    7. CLUSTER COMPUTING SECURITY
    8. PEER-TO-PEER NETWORK SECURITY
    9. GRID COMPUTING SECURITY
    10. CLOUD COMPUTING SECURITY
    11. FUTURE RESEARCH DIRECTIONS
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  18. Chapter 10: Tails Linux Operating System
    1. ABSTRACT
    2. INTRODUCTION
    3. THE BIRTH OF PUBLIC TOR
    4. HOW IT WORKS
    5. THE NECESSITY OF ANONYMITY AND CYBER SECURITY
    6. BIRTH OF TAILS OPERATING SYSTEM
    7. THE STRENGTHS
    8. LIMITATIONS AND FLOWS
    9. TOOL FOR FREEDOM AND DEMOCRACY
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  19. Chapter 11: Cyber Threats in Civil Aviation
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. TECHNOLOGICAL NECESSITY
    5. EDUCATING THE CYBER SECURITY WORKFORCE
    6. CYBER TERRORISM AND CYBER DEFENSE FOR CIVIL AVIATION INFRASTRUCTURE
    7. FAA STRUGGLES WITH CYBER SECURITY
    8. NATIONAL AND INTERNATIONAL STRATEGIES FOR COMBATING CYBER THREATS IN CIVIL AVIATION
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  20. Compilation of References
  21. About the Contributors