Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Internet of Things technologies, which connect various devices and sensors together, are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.
However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architecture and Industry 4.0. All these technologies are designed to support critical applications.
The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems, such as the Cloud or datacenter systems, rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.
This Special Issue gathers high-quality original research contributions and the latest research results in the field of threat detection within the IoT. It also covers threat analysis and corresponding defense techniques. The threats are related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic key management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Internet of Things technologies, which connect various devices and sensors together, are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.
However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architecture and Industry 4.0. All these technologies are designed to support critical applications.
The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems, such as the Cloud or datacenter systems, rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.
This Special Issue gathers high-quality original research contributions and the latest research results in the field of threat detection within the IoT. It also covers threat analysis and corresponding defense techniques. The threats are related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic key management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc.