This book presents a systematic and comprehensive overview for Io T security. It first introduces architecture approaches for Io T and Io T security, describing the security techniques for different layers in the Io T security architecture. It also provides an in-depth analysis on the difference between Io T security and traditional system and data security.
It is commonly known that information security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical Io T system construction, many more security measures need to be carefully considered. As such, this book presents around 60 different security measures, mainly focusing on the sensor layer of Io T. These security measures can serve as a source of reference for Io T system construction, as well as Io T security standard making.
Table of Content
1 Introduction.- 2 Architectures of the Internet of Things.- 3 Io T security architecture.- 4 Fundamentals of cryptography.- 5 Trust mechanism and key management in Io T.- 6 Io T perception layer security.- 7 Io T network layer security.- 8 Io T processing layer security.- 9 Privacy protection in Io T applications.- 10 RFID system security.- 11 On the IT security and the OT security in Io T.- 12 A comprehensive set of security measures for Io T.
About the author
Chuan-Kun Wu is currently a Distinguished Professor at Linyi University. He was a Research Professor supported by the ‘100-talent program’ of the Chinese Academy of Sciences from 2003 to 2016. Prof. Wu has published nearly 200 reviewed papers, and has recently published 3 books in Chinese on the Internet of Things (Io T), including ‘Security Fundamentals for Internet of Things’ and ‘Industrial Control Network Security: Technology and Practice’. In 2016, his book ‘Boolean Functions and their applications to cryptography’ was published by Springer.
Prof. Wu has been a senior member of IEEE since 2000, was an Associate Editor for IEEE Communications Letters from 2002-2012, and served as PC co-chair and organizing co-chair of a number of international conferences in the areas of cryptology and information security.