Coverart for item
The Resource Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)

Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)

Label
Security and fault tolerance in Internet of Things
Title
Security and fault tolerance in Internet of Things
Statement of responsibility
Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors
Contributor
Subject
Language
eng
Member of
Cataloging source
EBLCP
Dewey number
004.678
Index
no index present
LC call number
TK5105.8857
LC item number
.S43 2019
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Chakraborty, Rajat Subhra
  • Mathew, Jimson
  • Vasilakos, Athanasios
Series statement
Internet of Things: Technology, communications and computing
http://library.link/vocab/subjectName
  • Internet of things
  • Fault-tolerant computing
Label
Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Instantiates
Publication
Note
An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
Antecedent source
file reproduced from an electronic resource
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
  • 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
  • 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
  • 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
  • 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
Dimensions
unknown
Extent
1 online resource (221 p.).
File format
one file format
Form of item
online
Isbn
9783030028077
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
  • on1080085229
  • (OCoLC)1080085229
Label
Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Publication
Note
An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
Antecedent source
file reproduced from an electronic resource
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
  • 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
  • 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
  • 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
  • 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
Dimensions
unknown
Extent
1 online resource (221 p.).
File format
one file format
Form of item
online
Isbn
9783030028077
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
  • on1080085229
  • (OCoLC)1080085229

Library Locations

Processing Feedback ...