Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security challenges and approaches in Internet of Things
Misra S., Maheswaran M., Hashmi S., Springer International Publishing, New York, NY, 2016. 107 pp. Type: Book (978-3-319442-29-7)
Date Reviewed: Mar 23 2017

The Internet of Things (IoT) is a tremendously growing network that will affect our daily lives in every aspect. Therefore, the security of IoT needs to be carefully considered due to the size of the network. This book gives a well-organized survey on the security challenges and approaches in IoT. The contents include the system model, risk analysis, security mechanisms, and policy. Moreover, the authors also provide case studies of typical IoT applications such as vehicular ad hoc networks (VANETs), eHealth systems, and smart grids. The aforementioned contents depict a whole picture of current security issues and countermeasures for IoT.

In chapters 3 and 4, the authors illustrate the definitions with many figures. These figures are very helpful for understanding the difference between IoT and traditional networks. In chapters 4, 5, and 6, the authors go deeper in discussing the security challenges of IoT. The content here takes a top-level view, with less information about the specific protocols designed for solving security problems, such as cryptographic schemes. It would have been better if the book had provided more references on specific schemes, in order to relay the best knowledge about current research.

This is a very good book for beginners in the area of IoT security. It is also a useful comprehensive study for IoT users, engineers, and managers.

Reviewer:  Zheng Gong Review #: CR145136 (1706-0366)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Distributed Systems (C.2.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy