By Liehuang Zhu, Zijian Zhang, Chang Xu

This booklet customarily concentrates on preserving information protection and privateness while contributors converse with one another within the web of items (IoT). Technically, this booklet categorizes and introduces a set of safe and privacy-preserving facts communique schemes/protocols in 3 conventional eventualities of IoT: instant sensor networks, clever grid and vehicular ad-hoc networks lately. This booklet offers 3 benefits as a way to entice readers. first of all, it broadens reader’s horizon in IoT via referring to 3 attention-grabbing and complementary themes: information aggregation, privateness defense, and key contract and administration. Secondly, a variety of cryptographic schemes/protocols used to guard info confidentiality and integrity is gifted. ultimately, this booklet will illustrate the right way to layout functional platforms to enforce the algorithms within the context of IoT conversation. In precis, readers can easily research and without delay follow the hot applied sciences to speak info in IoT after studying this book.

Show description

Read Online or Download Secure and Privacy-Preserving Data Communication in Internet of Things PDF

Best security & encryption books

Chad Bayer's ExamWise For Exam 1D0-460 CIW Internetworking Professional PDF

A part of the ExamWise to CIW Certification sequence, this new Self support and Interactive examination examine reduction is now to be had for candidate's getting ready to sit down the CIW 1D0-460 Internetworking specialist examination. The publication covers the knowledge linked to all the examination issues intimately and contains details present in no different publication.

Get Mobile Access Safety: Beyond BYOD PDF

Over contemporary years, the quantity of cellular apparatus that should be attached to company networks remotely (smartphones, laptops, and so forth. ) has elevated swiftly. cutting edge improvement views and new developments corresponding to BYOD (bring your individual machine) are exposing enterprise details structures greater than ever to numerous compromising threats.

Download PDF by Chwan-Hwa (John) Wu, J. David Irwin: Introduction to computer networks and cybersecurity

"Draft advent to laptop Networking and Cybersecurity To the scholar it truly is tricky to overstate the significance of machine networks and community safety in modern-day international. they've got turn into such a vital part of our lifestyles that just a moment's mirrored image is needed to delineate the numerous ways that they effect basically each element of our lives.

Download PDF by Patrick D. Howard: Official (ISC)2® Guide to the CAP® CBK®, Second Edition

"Providing an summary of certification and accreditation, the second one version of this formally sanctioned advisor demonstrates the practicality and effectiveness of C & A as a threat administration technique for IT structures in private and non-private corporations. It allows readers to rfile the prestige in their defense controls and methods to safe IT structures through average, repeatable procedures.

Additional resources for Secure and Privacy-Preserving Data Communication in Internet of Things

Example text

Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier Computer Networks, 53(12): 2022–2037. 5. L. Hu and D. Evans. 2003. Secure aggregation for wireless networks. Proc. , 384–391. 6. J. A. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava. 2006. Participatory sensing. Proc. of the 1st ACM World-Sensor-Web(WSW) Workshops, 1–5. 7. Jeff Howe. 2006. Crowdsourcing: a definition, crowdsourcing: Why the power of the crowd is driving the future of business.

SRDA [52] is proposed for in cluster-based WSNs to reduce the number of bits in transmission since radio communication is the most energy-consuming behavior for a sensor node. It is done through letting sensor nodes send only the difference (difference data) between raw sensed data value with their reference data value. The reference data is the average value of a series of previous sensor readings. Specifically, (1) a key distribution protocol is implemented which results in secure peer-to-peer communication links between sensor node pairs.

F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. 2002. A survey on sensor networks. IEEE Commun. , 40 (8): 102–114. 2. J. Yick, B. Mukherjee and D. Ghosal. 2008. Wireless sensor network survey. Comput. Networks, 52 (12): 2292–2330. 3. K. Akkaya, M. S. Aygun. 2008. The Impact of Data Aggregation on the Performance of Wireless Sensor Networks. Wiley Wireless Commun. , 8: 171–193. 4. S. Ozdemir and Y. Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview.

Download PDF sample

Rated 4.21 of 5 – based on 23 votes