Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Book

Download BibTeX

Title

Evolution of Smart Sensing Ecosystems with Tamper Evident Security

Authors

[ 1 ] Instytut Informatyki, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2021

Book type

scientific monograph

Publication language

english

Abstract

EN This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting confidentiality, integrity, and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.

Place

Cham, Switzerland

Publisher name

Springer

Publisher name from the Ministry list

Springer

Date of publication

2021

Number of pages

174

ISBN

978-3-030-77763-0

eISBN

978-3-030-77764-7

DOI

10.1007/978-3-030-77764-7

URL

https://link.springer.com/book/10.1007/978-3-030-77764-7

Keywords
EN
  • Cybersecurity
  • Sensor networks
  • IoT devices
  • Device bootstrapping
  • Symmetric and Asymmetric cryptography
  • Homomorphic encryption
  • Neural Cryptography
Total point value of monograph

80

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.