1 - 7 of 7 Chapters
[Not only has this vision of Karl Steinbuch been realized for decades now, the term ‘connectivity’ is being redefined with the Internet of Things (IoT). With smartphones, tablets and ultra portable laptops having already revolutionized how, when and where people get connected, makers of sensors...
[The phrase “Internet of Things” was coined about 10 years ago by the founders of the original MIT Auto-ID Center, Kevin Ashton in 1999 and David L. Brock in 2001 , who envisioned “a world in which all electronic devices are networked and every object, whether it is physical or electronic,...
[To ensure evolution of the IoT into a secure infrastructure, it is indispensable to exhaustively identify the features of the IoT, which could be exploited to pose threat to either the infrastructure or its stakeholders. This chapter presents an in-depth analysis of the vulnerability space of...
[Security and privacy are the prime constraints to the popularity and acceptance of the IoT. Figure 4.1 from  indicates the opinions of security personnel active in the IT space on security in the IoT. According to , as we go back in time, the need of security and privacy in the...
[Social Governance is a philosophy of establishing a symbiotic framework to facilitate free flow of information between the three pivotal drivers of the networked society, namely, the service and device manufacturers, the policy making bodies, and the users of the devices and services, to foster...
[This chapter presents three major IoT deployments: connected vehicles involving vehicular ad-hoc networks or VANETs, eHealth, and the smart grid. The first two IoT deployments are presented in detail including sources of vulnerabilities, attack scenarios, and selected countermeasures. For the...
[The IoT is growing so fast; therefore, it is not far-fetched to expect a “super-connected world” in the near future. As the IoT is an extension of the Internet by design, most of the security and privacy issues of the Internet would be inherited by the IoT.]
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.