Internet of Things Security
Home > Computing and Information Technology > Computer hardware > Interrelated smart technologies > Internet of Things Security: Attacks, Tools, Techniques and Challenges
Internet of Things Security: Attacks, Tools, Techniques and Challenges

Internet of Things Security: Attacks, Tools, Techniques and Challenges


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applications, and the difficulties in securing such an expansive infrastructure. Readers gain insight into various security vulnerabilities present at each layer of IoT architecture, alongside viable security solutions. The book thoroughly examines distinct access control and authentication strategies, including intrusion detection systems (IDS), misuse detection, anomaly detection, DNS-based security solutions, and the implementation of artificial intelligence (AI) in cognitive IoT security. Additionally, the book explores microservice architecture for distributed IoT security and blockchain-based IoT security solutions.

Table of Contents:
1. Introduction to the Internet of Things (IoT) 2. Vulnerabilities, Attacks and Security Aspects in IoT 3. IoT Security Challenges and Future Directions 4. IoT Access Control and Authentication Schemes 5. Approaches for Misuse and Anomaly Detection in IoT Ecosystems 6. A Hybrid Approach for Analyzing Network Traffic Data Using Internet of Things and Safeguarding from Anomaly Detection Using Deep Neural Network Concepts 7. Enhancing Cyber Resilience in Resource-constrained Devices 8. Microservice Architecture for Securing Distributed IoT 9. Physically Unclonable Functions (PUF)-Based IoT Security: Challenges and Opportunities 10. Applications of AI/ML and Blockchain in IoT Security

About the Author :
Preeti Mishra is an Assistant Professor in the Department of Computer Science at Doon University, Dehradun, India, and serves as the mentor for the Advanced Cyber Security Research Group (ACSR) at the university. She has 10+ years teaching and research experience. She has been awarded Ph.D. in Computer Science and Engineering from Malaviya National Institute of Technology Jaipur, India, under the supervision of Dr. Emmanuel S. Pilli and Prof. Vijay Varadharajan (2017). She is a B.Tech and M.Tech Gold Medalist. She has published various reputed SCI/SCIE indexed international journals and reputed conference papers in the area of security and privacy. Some of her key research publications have been published in IEEE Transactions on Cloud Computing (with IF 5.720), IEEE Communication Surveys and Tutorials (with IF 35), IEEE Transactions on Industrial Informatics (IF: 9+), Cluster Computing (IF:3.6) etc. She worked as a visiting scholar in Macquarie University Sydney under Prof. Vijay Varadharajan in 2015 and has been awarded a fellowship, administered by the Department Administrators in Department of Computing, Macquarie University, Sydney. She has also been awarded by Uttarakhand Government under ‘Chief Minister's Excellent Research Paper Publication Incentive Scheme” for outstanding contribution in research. Her research proposal valued more than 20 lakhs has been awarded and sanctioned by the prestigious SERB-DST, Govt. of India in the area of Cloud Security. She was also awarded research grants from reputed Data Security Council of India (DSCI) organization (in malware analysis project) and Uttarakhand State Council for Science and Technology (adversarial machine learning project). She is among the few scientists from India to receive a highly prestigious and competitive research grant under SERB-POWER Mobility scheme, providing her with the opportunity to conduct cybersecurity research (as a visiting research professor) for two months at the University of Padua, Italy, under the mentorship of renowned cybersecurity expert Prof. Mauro Conti. She has also published an authored book with Taylor and Francis, CRC press entitled, Cloud Security: Attacks, tools, techniques and challenges. Her area of interest includes Cloud Security, E-mail Security and Network Security, Internet of Things, Blockchain, Cyber Security, Mobile Security, Adversarial Machine Learning, etc. She served as a Lead Guest Editor in IEEE Transaction on Industrial Informatics (TII) and IEEE Systems. Senthil Kumar Jagatheesaperumal received his B.E. degree in Electronics and Communication Engineering from Madurai Kamaraj University, Madurai, India in 2003. He received his post-graduation degree in Communication Systems from Anna University, Chennai, India in 2005. He received his Ph.D. in Information and Communication Engineering from Anna University, Chennai, India in 2017. He is an Associate Professor (Senior Grade) in the Department of Electronics and Communication Engineering, Mepco Schlenk Engineering College, Sivakasi, India. Some of his key research publications have been published in IEEE Wireless Communications (IF 10.9), IEEE Internet of Things Journal (with IF 8.2), IEEE Communication Surveys and Tutorials (with IF 35), and IEEE Open Journal of the Communications Society (IF: 6.3) etc. To his credit, he has been granted five utility patents to date. He received two funded research projects from National Instruments, USA, each worth USD 50,000, during the years 2015 and 2016. He also received another funded research project from IITM-RUTAG in 2017 worth Rs.3.97 Lakhs. Recently, in 2024, he received a sponsored research project from IHub- Data worth Rs.8.2 Lakhs. His area of research includes the Internet of Things, Robotics, Embedded Systems, and Wireless Communication. He is a Member of IEEE, IETE and ISTE. Umang Garg is working as an Associate Professor in the Department of Computer Science and Engineering, MIT Art, Design, and Technology University, Pune, India. He received his PhD degree from Graphic Era Deemed to be University in the field of IoT botnet detection and mitigation technique. During his PhD, he focused on the intrusion detection techniques for the analysis of IoT Botnet. His current area of research is Large Language Model (LLM) for malware detection. He has 15 years of teaching and research experience. He has published more than 40 research articles in reputed Scopus indexed journals and conferences. He has more than 8 Patents in his credit and 2 patents have been granted. He is reviewer in various Journals and Conference Proceeding and invited as an expert for session chair in various international conferences. He is Member of CSI and IEEE. Kallol Krishna Karmakar is working as a lecturer in Cybersecurity at the School of Information Technology, Deakin University. He is a member of Deakin Cyber and Advanced Cyber Security Engineering Research Centre (ACSRC. He received his PhD in Cybersecurity from the University of Newcastle. His PhD research focused on developing security services for Software Defined Network (SDN). During his PhD, he also worked with Data61, CSIRO, to protect the Internet of Things from attacks. His current research focuses on securing future programmable network architectures and services, Network Function Virtualisation (NFV) security, Internet of Things (IoT) security, Malware reverse engineering etc. He has published several publications in various international flagship conferences and journals, such as IEEE IM, IEEE LCN, TIFS, TNSM etc. He worked as a visiting researcher at the Cyber Data Lab, University of Murcia. He is actively working with various government organisations, such as DST, CSIRO, ISIF etc, on various cybersecurity-related projects. Prof. Brij B. Gupta is working as Director of the International Center for AI and Cyber Security Research and Innovations (CCRI), and Distinguished Professor with the Department of Computer Science and Information Engineering (CSIE), Asia University, Taiwan. In more than 20 years of professional experience, he has published over 600 papers in reputed journals and conferences, authored/edited 35 books, and holds 12 patents. His work has received over 35,000 citations to date. He has been the recipient of numerous prestigious national and international awards, including the Canadian Commonwealth Scholarship (2009), Faculty Research Fellowship Award (2017) from MeitY, Government of India, IEEE GCCE Outstanding Paper Award, IEEE WIE Best Paper Award, and Best Faculty Awards (2018 & 2019). Prof. Gupta has been recognized in Clarivate Web of Science's Highly Cited Researchers list in Computer Science (top 0.1% globally) in both 2022 and 2023. He has also been included in Stanford University's global ranking of the top 2% scientists for five consecutive years (2020–2024). He is a Senior Member of IEEE since 2017 and was selected as an IEEE CTSoc Distinguished Lecturer in 2021. He served as Member-in-Large on the Board of Governors for the IEEE Consumer Technology Society (2022–2024). He leads several journals as Editor-in-Chief, including IJSWIS, IJSSCI, and IJCAC, and serves as the lead editor for book series with CRC Press and IET Press. His research interests span information security, cyber-physical systems, cloud computing, blockchain, intrusion detection, artificial intelligence, social media, and network security.


Best Sellers


Product Details
  • ISBN-13: 9780443337598
  • Publisher: Elsevier - Health Sciences Division
  • Publisher Imprint: Elsevier - Health Sciences Division
  • Height: 229 mm
  • No of Pages: 330
  • Width: 152 mm
  • ISBN-10: 0443337594
  • Publisher Date: 20 Oct 2025
  • Binding: Paperback
  • Language: English
  • Sub Title: Attacks, Tools, Techniques and Challenges


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Internet of Things Security: Attacks, Tools, Techniques and Challenges
Elsevier - Health Sciences Division -
Internet of Things Security: Attacks, Tools, Techniques and Challenges
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Internet of Things Security: Attacks, Tools, Techniques and Challenges

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!