IoT security : (Record no. 26341)

MARC details
000 -LEADER
fixed length control field 03584nam a2200361 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231026133504.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231019s2020 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019029942
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119527923
Qualifying information (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency CSPC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.8857
Item number .I735 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.83
Item number Io8
245 00 - TITLE STATEMENT
Title IoT security :
Remainder of title advances in authentication /
Statement of responsibility, etc. edited by Madhusanka Liyanage [and 3 others].
250 ## - EDITION STATEMENT
Edition statement First edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 1911
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 285 pages :
Other physical details illustrations ;
Dimensions 25 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems.
520 ## - SUMMARY, ETC.
Summary, etc. "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liyanage, Madhusanka,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Braeken, An,
Dates associated with a name 1970-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Pardeep,
Dates associated with a name 1976-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ylianttila, Mika,
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Classification part 005.83
Item part Io8
Call number prefix CIR
Call number suffix 2020
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library-Nabua Main Library-Nabua Circulation Section 10/19/2023 1 CIR 005.83 Io8 2020 026156 08/29/2024 08/16/2024 1-1 10/19/2023 Books