Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies. It provides detailed insights into the unique security and privacy concerns, such as malicious attacks, data breaches, insider threats, and privacy breaches, that arise in the context of real-time applications, like in smart homes, smart cities, industrial automation, healthcare, and other time-sensitive domains to offer practical solutions and strategies to mitigate these risks.
Covers various aspects of security and privacy, including authentication, access control, data integrity, confidentiality, availability, threat detection and mitigation, privacy-preserving techniques Investigates the possibilities of cross-layer approaches to address the specific requirements of real-time applications and develop innovative solutions Gaining insights into fundamental limits through information-theoretic research, new protocol designs are developed to access the medium in an energy-efficient manner to improve the performance and reliability of WSN and IoT networks for real-time applications Discusses the sustainable requirements of emerging real-time applications, such as low energy consumption and high data rates Offers an interdisciplinary approach that encompasses areas of communication, networking, and information theory to guide real-life deployment of IoT/ WSN-based monitoring systems
It is a valuable reference for readers who want to gain a deeper understanding of the challenges and solutions related to the security and privacy of IoT and WSN in the context of real-time applications.
Comments