Security Solutions for Hyperconnectivity and the Internet of Things

Security Solutions for Hyperconnectivity and the Internet of Things

Author: Dawson, Maurice

Publisher: IGI Global

Published: 2016-08-30

Total Pages: 368

ISBN-13: 1522507426

DOWNLOAD EBOOK

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.


Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities

Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities

Author: Kim, Sungwook

Publisher: IGI Global

Published: 2017-01-06

Total Pages: 235

ISBN-13: 152251953X

DOWNLOAD EBOOK

There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.


Cognitive Hyperconnected Digital Transformation

Cognitive Hyperconnected Digital Transformation

Author: Ovidiu Vermesan

Publisher: River Publishers

Published: 2017-06-23

Total Pages: 338

ISBN-13: 8793609116

DOWNLOAD EBOOK

Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex info


Security Breaches and Threat Prevention in the Internet of Things

Security Breaches and Threat Prevention in the Internet of Things

Author: Jeyanthi, N.

Publisher: IGI Global

Published: 2017-02-01

Total Pages: 290

ISBN-13: 1522522972

DOWNLOAD EBOOK

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.


Next Generation Internet of Things

Next Generation Internet of Things

Author: Vermesan, Ovidiu

Publisher: River Publishers

Published: 2019-01-15

Total Pages: 352

ISBN-13: 8770220085

DOWNLOAD EBOOK

This book provides an overview of the next generation Internet of Things (IoT), ranging from research, innovation, development priorities, to enabling technologies in a global context. It is intended as a standalone in a series covering the activities of the Internet of Things European Research Cluster (IERC), including research, technological innovation, validation, and deployment. The text builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI), the IoT European Large-Scale Pilots Programme and the IoT European Security and Privacy Projects, presenting global views and state-of-the-art results regarding the next generation of IoT research, innovation, development, and deployment. The IoT and Industrial Internet of Things (IIoT) are evolving towards the next generation of Tactile IoT/IIoT, bringing together hyperconnectivity (5G and beyond), edge computing, Distributed Ledger Technologies (DLTs), virtual and augmented reality (VR/AR), and AI transformation. Following the wider adoption of consumer IoT, the next generation of IoT/IIoT innovation for business is driven by industries, addressing interoperability issues and providing new end-to-end security solutions to face continuous treats. The advances of AI technology in vision, speech recognition, natural language processing and dialog are enabling the development of end-to-end intelligent systems encapsulating multiple technologies, delivering services in real-time using limited resources. These developments are focusing on designing and delivering embedded and hierarchical AI solutions in IoT/IIoT, edge computing, using distributed architectures, DLTs platforms and distributed end-to-end security, which provide real-time decisions using less data and computational resources, while accessing each type of resource in a way that enhances the accuracy and performance of models in the various IoT/IIoT applications. The convergence and combination of IoT, AI and other related technologies to derive insights, decisions and revenue from sensor data provide new business models and sources of monetization. Meanwhile, scalable, IoT-enabled applications have become part of larger business objectives, enabling digital transformation with a focus on new services and applications. Serving the next generation of Tactile IoT/IIoT real-time use cases over 5G and Network Slicing technology is essential for consumer and industrial applications and support reducing operational costs, increasing efficiency and leveraging additional capabilities for real-time autonomous systems. New IoT distributed architectures, combined with system-level architectures for edge/fog computing, are evolving IoT platforms, including AI and DLTs, with embedded intelligence into the hyperconnectivity infrastructure. The next generation of IoT/IIoT technologies are highly transformational, enabling innovation at scale, and autonomous decision-making in various application domains such as healthcare, smart homes, smart buildings, smart cities, energy, agriculture, transportation and autonomous vehicles, the military, logistics and supply chain, retail and wholesale, manufacturing, mining and oil and gas.


Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities

Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities

Author: Usman, Muhammad

Publisher: IGI Global

Published: 2018-01-26

Total Pages: 187

ISBN-13: 1522550305

DOWNLOAD EBOOK

Data analysis forms the basis of many modes of research ranging from scientific discoveries to governmental findings. With the advent of machine intelligence and neural networks, extracting and modeling, approaching data has been unimpeachably altered. These changes, seemingly small, affect the way societies organize themselves, deliver services, or interact with each other. Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities provides emerging information on extraction and prediction patterns in data mining along with knowledge discovery. While highlighting the current issues in data extraction, readers will learn new methodologies comprising of different algorithms that automate the multidimensional schema that remove the manual processes. This book is a vital resource for researchers, academics, and those seeking new information on data mining techniques and trends.


Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities

Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities

Author: Shafrir, Uri

Publisher: IGI Global

Published: 2017-07-13

Total Pages: 148

ISBN-13: 1522521771

DOWNLOAD EBOOK

Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured digital content. Highlighting pertinent topics such as semantic tools, semiotic systems, and pattern detection, this book is ideally designed for researchers, academics, students, professionals, and practitioners interested in developing a better understanding of digital text analysis.


Security Solutions and Applied Cryptography in Smart Grid Communications

Security Solutions and Applied Cryptography in Smart Grid Communications

Author: Ferrag, Mohamed Amine

Publisher: IGI Global

Published: 2016-11-29

Total Pages: 485

ISBN-13: 1522518304

DOWNLOAD EBOOK

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.


Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Author: Gunasekhar, T.

Publisher: IGI Global

Published: 2019-02-15

Total Pages: 149

ISBN-13: 1522579257

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.


Redefining Security With Cyber AI

Redefining Security With Cyber AI

Author: Omar, Marwan

Publisher: IGI Global

Published: 2024-07-17

Total Pages: 287

ISBN-13:

DOWNLOAD EBOOK

In the rapidly evolving digital landscape, the importance of cybersecurity has never been more critical. With the increasing sophistication of cyber threats, traditional security measures often fall short in providing adequate protection. Cyber artificial intelligence (AI) offers advanced capabilities to detect, prevent, and respond to attacks in real time. As cyber threats continue to grow in complexity and frequency, the integration of AI into cybersecurity frameworks is not just advantageous but essential for maintaining robust and resilient defenses. Redefining Security With Cyber AI delves into the profound transformation of security paradigms brought about by the advent of AI. This book explores the intricate dance between the ever-expanding frontiers of digital technology and the AI-driven mechanisms that aim to safeguard them. Covering topics such as artificial neural networks, intrusion detection, and large language models, this book is an excellent resource for cybersecurity professionals, AI and machine learning researchers, IT executives and managers, policy makers and regulators, postgraduate students and educators, academicians, and more.