- литература в один клик

IoT Applications, Security Threats, and Countermeasures

  • Добавил: literator
  • Дата: 17-07-2021, 16:40
  • Комментариев: 0
[IoT Applications, Security Threats, and Countermeasuresb]Название[/b]: IoT Applications, Security Threats, and Countermeasures
Автор: Padmalaya Nayak, Niranjan Ray, P. Ravichandran
Издательство: CRC Press
Год: 2022
Страниц: 279
Язык: английский
Формат: pdf (true)
Размер: 17.3 MB

The massive growth of interconnected IoT devices poses an enormous range of cybersecurity challenges because of the globally pervasive influence of Internet technology and its increasing adoption in online communications and e-transactions. As IoT devices are being deployed in record numbers, the rise in their popularity comes with its fair share of potential challenges and security vulnerabilities. Some of the
pressing IoT security concerns include the following:

Ransomware attacks and hijacking user data.
Insufficient testing and lack of timely software updates.
Hackers gaining unlawful access to users’ IP addresses.
Identity fraud and financial crime.
Remote smart vehicle access.
Installing counterfeit IoT devices in secured networks.
Lack of awareness among users.

The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture.

Fundamental concepts of gathering, processing, and analyzing different Artificial Intelligence (AI) models in IoT applications are covered along with recent detection mechanisms for different types of attacks for effective network communication. On par with the standards laid out by international organizations in related fields, the book focuses on both core concepts of IoT along with major application areas.

Owing to the enormous growth of IoT, hackers are eager to execute different types of attacks by exploiting the computational and communication capabilities of IoT devices. There are many types of cyberattacks such as denial-of-service (DoS), distributed denial-of-service (DDoS), password attacks, birthday attacks, phishing attacks, man in the middle attacks, and so on, which target the information-processing systems, computer networks, infrastructures or personal devices using various methods to steal, modify, and destroy the data. Today, particularly, DDoS attack is the major concern on the Internet, and it occurs in networks with the interconnected systems.

These networks consist of several computers and IoT devices that are infected by malware. These devices are remotely controlled by the attacker, and each device is called a bot or zombie. The group of bots or zombies are called a botnet, which is controlled by an attacker or botmaster. The botmaster is used to perform different activities such as DDoS attacks, spamming, click fraud, phishing attacks, and so on. Millions of IoT devices are interconnected through the Internet and causing significant risks to Internet security. The major concern is that IoT devices have several vulnerabilities to be utilized to create IoT botnets. These devices are large in number and create a huge risk to Internet security compared to ordinary Internet-connected devices. In addition, the resource limitations and protocol diversity make IoT devices a valuable target for attackers to create IoT botnet.

Designed for technical developers, academicians, data scientists, industrial researchers, professionals, and students, this book is useful in uncovering the latest innovations in the field of IoT.

Скачать IoT Applications, Security Threats, and Countermeasures

Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.