
Security and Privacy Issues for IoT and WSN-based Real-time Applications
Series: Chapman & Hall/CRC Cyber-Physical Systems;
- Publisher's listprice GBP 115.00
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 5 820 Ft off)
- Discounted price 52 381 Ft (49 887 Ft + 5% VAT)
58 201 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher Chapman and Hall
- Date of Publication 16 June 2025
- ISBN 9781032776682
- Binding Hardback
- No. of pages214 pages
- Size 246x174 mm
- Language English
- Illustrations 74 Illustrations, black & white; 74 Line drawings, black & white; 18 Tables, black & white 700
Categories
Short description:
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It is a valuable resource for readers interested in the security and privacy challenges and solutions for IoT and WSN-based real-time applications.
MoreLong description:
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It provides detailed insights into the unique security and privacy concerns, such as malicious attacks, data breaches, insider threats, and privacy breaches, that arise in the context of real-time applications, like in smart homes, smart cities, industrial automation, healthcare, and other time-sensitive domains to offer practical solutions and strategies to mitigate these risks.
Key Features:
? Covers various aspects of security and privacy, including authentication, access control, data integrity, confidentiality, availability, threat detection and mitigation, privacy-preserving techniques.
? Investigate the possibilities of cross-layer approaches to address the specific requirements of real-time applications and develop innovative solutions.
? Gaining insights into fundamental limits through information-theoretic research, new protocol designs are developed to access the medium in an energy-efficient manner to improve the performance and reliability of WSN and IoT networks for real-time applications.
? Discusses the sustainable requirements of emerging real-time applications, such as low energy consumption and high data rates.
? Offers an interdisciplinary approach that encompasses areas of communication, networking, and information theory to guide real-life deployment of IoT/WSN-based monitoring systems.
It is a valuable reference for readers who want to gain a deeper understanding of the challenges and solutions related to the security and privacy of IoT and WSN in the context of real-time applications.
MoreTable of Contents:
Chapter 1 ? Introduction of Security and Privacy Issues for IoT and WSN. Chapter 2 ? Systematic Literature Review on Security and Privacy Issues on WSN and IoT. Chapter 3 ? Cyber Security Concerns of IoT for Real-Time Applications: A Review. Chapter 4 ? Security Concerns of IoT/WSN for Real-Time Applications. Chapter 5 ? Security and Privacy Issues for Blockchain Scenarios in IoT and WSN-based Real-Time Applications. Chapter 6 ? Congestion-Aware and Delay-Aware Application-Specific Security Protocol for WSN/IoT. Chapter 7 ? Security Concerns of IoT in Health Monitoring Applications. Chapter 8 ? Proactive Security Approaches for IoT in Health Monitoring Applications. Chapter 9 ? CEIDS - Cost-effective and Energy-effective Intrusion Detection System in WSN. Chapter 10 ? Mathematics and Queue Discipline ? An Approach to Online Examination Data Security. Chapter 11 ? Trust-Based Optimization Routing Algorithm for Wireless Sensor Networks Using Enhanced M-TCAAA Technique. Chapter 12 ? Future Scope for Integration of IoT/WSN with Upcoming Wireless Technology. Chapter 13 ? Securing the Future: Navigating Privacy Challenges in Real-Time IoT and WSN Applications.
More