Book Title: Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations


(Publisher: Taylor & Francis LLC, CRC Press )

About the publisher: ( http://www.crcpress.com/ ) As one of the world's largest publishers, Taylor & Francis maintains offices throughout the world including London, Brighton, and Abingdon in the U.K.; New York, Philadelphia, Florence, Kentucky, and Boca Raton, Florida in the U.S.A.; and Singapore, Australia, China, and India. Publishing more than 1,500 journals and approximately 3,300 new books each year, the Taylor and Francis Group has a backlist in excess of 60,000 specialist titles.

Important Dates:

Title and Abstract Due: November 15, 2014 (please email to Dr. Fei Hu: fei@eng.ua.edu)

Final Chapter Draft Due: April 2, 2015

Camera-Ready Due: June 1, 2015

Send for Publishing: around July, 2015

Note: Please submit all finished book chapters and inquires to Dr. Fei Hu {email: fei@eng.ua.edu}.

*********************************************************************

Authors' Kit

Microsoft WORD Format Template

WORD instructions

Latex Template

**************************************************************************************

2. Book Information

 Book Editors: Dr. Fei Hu { web: http://feihu.eng.ua.edu }

Associate Professor

Department of Electrical and Computer Engineering

University of Alabama,

Tuscaloosa, AL 35487

E-mail: fei@eng.ua.edu

  

1. Book Abstract:
The Internet of Things (IoTs) allow human beings and environmental objects to be seamlessly interconnected anytime and anywhere. The core technologies that advance the IoTs are sensor /sensor networks, RFIDs, wireless communications, and Internet. IoTs can be used to reach any mobile devices, reach and track smart objects, and make our surroundings become "smart" by knowing what we want and act accordingly with minimum human interventions. IoTs can achieve smart home and anywhere medical care, as well as smart city.
Security and privacy are big challenges with the progress of IoT products. This is because any attack to the sensors or RFID tags could mislead the IoT monitoring system. For example, the IoT needs to manage the electricity, water, and gas uses via real-time sensor data collection. An adversary may cut off the supply of those utilities while in the same time injecting falsified sensor data.
In this book, we will cover the critical models, algorithms, and implementations in security and privacy designs of IoTs. Especially, we will cover the following topics: (1) the attack models of IoTs; (2) the security designs in sensors and devices that are linked into IoTs; (3) new IoT network protocols for security; (4) IoT back-end security issues; (5) privacy preservation schemes; and (6) current IoT security products.

 

2. Targeted Audiences
This book will attract many readers' attentions. Especially, the IoT engineers in IT industry can use this book to understand the security design principles and methodologies. And many researchers can learn the latest development trend in IoT security schemes. College students can use this book as a good reference for further research in this important field.

Table of Contents (tentative; could change after receiving contributors' drafts)

Preface

Part I. Fundamentals

Ch 1. Architecture of IoTs
Ch 2. IoT Security Requirements
Ch 3. IoT Privacy Preservation Issues

Part II. Attack Models

Ch 4. Attacks to Sensors in IoTs
Ch 5. Attacks to RFIDs in IoTs
Ch 6. Attacks to Network Functions in IoTs
Ch 7. Attacks to Back-end Systems

Part III. Security in Front-end Sensors and Equipment

Ch 8. Prevent Unauthorized Access to Sensor Data
Ch 9. M2M Security
Ch 10. RFID Security
Ch 11. Cyber-Physical Object Security
Ch 12. Hardware Security
Ch 13. Front-end System Privacy Protection

Part IV. Networking Function Security

Ch 14. IoT Networking Protocols
Ch 15. Secure IoT Lower Layers
Ch 16. Secure IoT Higher Layers
Ch 17. Secure Communication Links in IoTs

Part V. Back-end Security

Ch 18. Secure Resource Management
Ch 19. Secure IoT Databases

Part VI. Security Products

Ch 20. Existing Testbed on Security and Privacy of IoTs
Ch 21. Commercialized Products