Atjaunināt sīkdatņu piekrišanu

E-grāmata: Secure and Privacy-Preserving Data Communication in Internet of Things

  • Formāts - EPUB+DRM
  • Cena: 59,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.


This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

1 Introduction
1(2)
2 Secure Data Aggregation in Wireless Sensor Networks
3(30)
2.1 Problems, Models and Goals
5(5)
2.2 Cryptographic-Based Data Aggregation Schemes
10(13)
2.3 Non Cryptographic-Based Data Aggregation Schemes
23(5)
2.4 Summary
28(5)
References
28(5)
3 Privacy-Preserving Meter Reading Transmission in Smart Grid
33(20)
3.1 Problems, Models and Goals
34(4)
3.2 Cryptographic-Based Privacy-Preserving Schemes
38(7)
3.3 Perturbation-Based Privacy-Preserving Schemes
45(5)
3.4 Summary
50(3)
References
50(3)
4 Security and Privacy Preservation in VANET
53(24)
4.1 Problems, Models and Goals
53(5)
4.2 Cryptographic-Based Secure and Privacy-Preserving Schemes
58(7)
4.3 Non Cryptographic-Based Secure and Privacy-Preserving Schemes
65(8)
4.4 Summary
73(4)
References
73(4)
5 Conclusion
77
Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.

Zijian Zhangis an assistant professor in the School of Computer Science and Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.

Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication  Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on " Security and Privacy Challenges in Vehicular Cloud Computing", 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.