Book Title: Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
(Publisher: Taylor & Francis LLC,
CRC Press )
Important Dates:
Title and Abstract Due: November 15, 2014 (please email to Dr. Fei Hu: fei@eng.ua.edu)
Final Chapter Draft Due: April 2, 2015
Camera-Ready Due: June 1, 2015
Send for Publishing: around July, 2015
Note: Please submit
all finished book chapters and inquires to Dr. Fei Hu {email: fei@eng.ua.edu}.
*********************************************************************
Authors' Kit
Microsoft WORD Format Template
**************************************************************************************
2. Book Information
Book
Editors:
Associate Professor
Department of Electrical and Computer Engineering
University of Alabama,
Tuscaloosa, AL 35487
E-mail: fei@eng.ua.edu
1.
Book Abstract:
The Internet of Things (IoTs) allow human beings and environmental objects
to be seamlessly interconnected anytime and anywhere. The core technologies
that advance the IoTs are sensor /sensor networks, RFIDs, wireless communications,
and Internet. IoTs can be used to reach any mobile devices, reach and track
smart objects, and make our surroundings become "smart" by knowing
what we want and act accordingly with minimum human interventions. IoTs can
achieve smart home and anywhere medical care, as well as smart city.
Security and privacy are big challenges with the progress of IoT products.
This is because any attack to the sensors or RFID tags could mislead the IoT
monitoring system. For example, the IoT needs to manage the electricity, water,
and gas uses via real-time sensor data collection. An adversary may cut off
the supply of those utilities while in the same time injecting falsified sensor
data.
In this book, we will cover the critical models, algorithms, and implementations
in security and privacy designs of IoTs. Especially, we will cover the following
topics: (1) the attack models of IoTs; (2) the security designs in sensors
and devices that are linked into IoTs; (3) new IoT network protocols for security;
(4) IoT back-end security issues; (5) privacy preservation schemes; and (6)
current IoT security products.
2.
Targeted Audiences
This book will attract many readers' attentions. Especially, the IoT engineers
in IT industry can use this book to understand the security design principles
and methodologies. And many researchers can learn the latest development trend
in IoT security schemes. College students can use this book as a good reference
for further research in this important field.
Table of Contents
Preface
Part I. Fundamentals
Ch 1. Architecture of IoTs
Ch 2. IoT Security Requirements
Ch 3. IoT Privacy Preservation Issues
Part II. Attack Models
Ch 4. Attacks to Sensors in IoTs
Ch 5. Attacks to RFIDs in IoTs
Ch 6. Attacks to Network Functions in IoTs
Ch 7. Attacks to Back-end Systems
Part III. Security in Front-end Sensors and Equipment
Ch 8. Prevent Unauthorized Access to Sensor Data
Ch 9. M2M Security
Ch 10. RFID Security
Ch 11. Cyber-Physical Object Security
Ch 12. Hardware Security
Ch 13. Front-end System Privacy Protection
Part IV. Networking Function Security
Ch 14. IoT Networking Protocols
Ch 15. Secure IoT Lower Layers
Ch 16. Secure IoT Higher Layers
Ch 17. Secure Communication Links in IoTs
Part V. Back-end Security
Ch 18. Secure Resource Management
Ch 19. Secure IoT Databases
Part VI. Security Products
Ch 20. Existing Testbed on Security and Privacy of IoTs
Ch 21. Commercialized Products