000 03387nam a22005655i 4500
001 978-981-10-3235-6
003 DE-He213
005 20220801222451.0
007 cr nn 008mamaa
008 170223s2017 si | s |||| 0|eng d
020 _a9789811032356
_9978-981-10-3235-6
024 7 _a10.1007/978-981-10-3235-6
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aZhu, Liehuang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_961652
245 1 0 _aSecure and Privacy-Preserving Data Communication in Internet of Things
_h[electronic resource] /
_cby Liehuang Zhu, Zijian Zhang, Chang Xu.
250 _a1st ed. 2017.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2017.
300 _aVII, 78 p. 22 illus., 10 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Signal Processing,
_x2196-4084
505 0 _aIntroduction -- Secure Data Aggregation in Wireless Sensor Network -- Privacy preserving Meter Reading Transmission in Smart Grid -- Key Agreement and Management in Vehicular Ad-hoc Network -- Conclusion.
520 _aThis book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.
650 0 _aTelecommunication.
_910437
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aSecurity systems.
_931879
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aCryptology.
_931769
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aZhang, Zijian.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_961653
700 1 _aXu, Chang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_961654
710 2 _aSpringerLink (Online service)
_961655
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811032349
776 0 8 _iPrinted edition:
_z9789811032363
830 0 _aSpringerBriefs in Signal Processing,
_x2196-4084
_961656
856 4 0 _uhttps://doi.org/10.1007/978-981-10-3235-6
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80800
_d80800