找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Internet of Things Security: Principles and Practice; Qinghao Tang,Fan Du Book 2021 The Editor(s) (if applicable) and The Author(s), under

[复制链接]
查看: 44058|回复: 37
发表于 2025-3-21 17:01:31 | 显示全部楼层 |阅读模式
书目名称Internet of Things Security: Principles and Practice
编辑Qinghao Tang,Fan Du
视频video
概述Includes how to find IoT device vulnerabilities from basic to advanced, how to analyze wireless communication data by using HackRF and Sniffer and how to build a secure IoT system.Shares codes and rea
图书封面Titlebook: Internet of Things Security: Principles and Practice;  Qinghao Tang,Fan Du Book 2021 The Editor(s) (if applicable) and The Author(s), under
描述.Over the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. ..Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks,Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they share
出版日期Book 2021
关键词IoT Security; IoT Security Practice; IoT Security Handbook; Hack IoT; IoT Penetration; IoT Vulnerability
版次1
doihttps://doi.org/10.1007/978-981-15-9942-2
isbn_softcover978-981-15-9941-5
isbn_ebook978-981-15-9942-2
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

书目名称Internet of Things Security: Principles and Practice影响因子(影响力)




书目名称Internet of Things Security: Principles and Practice影响因子(影响力)学科排名




书目名称Internet of Things Security: Principles and Practice网络公开度




书目名称Internet of Things Security: Principles and Practice网络公开度学科排名




书目名称Internet of Things Security: Principles and Practice被引频次




书目名称Internet of Things Security: Principles and Practice被引频次学科排名




书目名称Internet of Things Security: Principles and Practice年度引用




书目名称Internet of Things Security: Principles and Practice年度引用学科排名




书目名称Internet of Things Security: Principles and Practice读者反馈




书目名称Internet of Things Security: Principles and Practice读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:57:46 | 显示全部楼层
发表于 2025-3-22 02:28:31 | 显示全部楼层
发表于 2025-3-22 06:08:31 | 显示全部楼层
Book 2021 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. ..Generally, four key aspects are i
发表于 2025-3-22 09:22:56 | 显示全部楼层
The Analysis on Hardwaree can use smart cameras to monitor pets in the house. However, IoT devices also increase risks for many families, so it is necessary to analyze the security performance of IoT devices. Any IoT device can be analyzed by security researchers from hardware, wireless communication, and firmware. The fir
发表于 2025-3-22 15:22:50 | 显示全部楼层
The Analysis of Wireless Communication Protocol communicate through wireless protocols. Common wireless protocols include Wi-Fi, Bluetooth, ZigBee, etc., which help IoT products achieve a good user experience. Because these protocols must continue to meet the needs of users in a variety of scenarios, there are complex risks that may be exploited
发表于 2025-3-22 20:31:22 | 显示全部楼层
Basic Knowledge of Firmwareftware running in an IoT operating system like windows or centos is called firmware, which is generally an embedded Linux system or an Android system. A thorough analysis of the firmware helps security researchers identify all security issues in IoT products. This chapter includes not only the basic
发表于 2025-3-22 23:37:48 | 显示全部楼层
发表于 2025-3-23 02:52:57 | 显示全部楼层
Techniques for IoT System Securityis book, readers will realize that there are still many risks in the current IoT ecosystem. IoT manufacturers not only need to design devices with rich functions to improve consumers’ experience, they should also pay their attention to security based on various costs and technological maturity.
发表于 2025-3-23 06:18:51 | 显示全部楼层
Solutions for IoT System Securityo have three functions: identification and authentication; OTA firmware update; and terminal device security protection. If these IoT infrastructure security construction strategies are used appropriately, they will become powerful tools for IoT manufactures to ensure device security.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 06:53
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表