MARC details
000 -LEADER |
fixed length control field |
03584nam a2200361 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CSPC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231026133504.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231019s2020 nju b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2019029942 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119527923 |
Qualifying information |
(hardback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
CSPC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.8857 |
Item number |
.I735 2019 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.83 |
Item number |
Io8 |
245 00 - TITLE STATEMENT |
Title |
IoT security : |
Remainder of title |
advances in authentication / |
Statement of responsibility, etc. |
edited by Madhusanka Liyanage [and 3 others]. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
1911 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer |
Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxix, 285 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet of things |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Liyanage, Madhusanka, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Braeken, An, |
Dates associated with a name |
1970- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kumar, Pardeep, |
Dates associated with a name |
1976- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Ylianttila, Mika, |
Relator term |
editor. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Classification part |
005.83 |
Item part |
Io8 |
Call number prefix |
CIR |
Call number suffix |
2020 |
Suppress in OPAC |
No |