The Resource Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Resource Information
The item Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool.
This item is available to borrow from 1 library branch.
- Extent
- 1 online resource (221 p.).
- Note
- An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
- Contents
-
- Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
- 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
- 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
- 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
- 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
- Isbn
- 9783030028077
- Label
- Security and fault tolerance in Internet of Things
- Title
- Security and fault tolerance in Internet of Things
- Statement of responsibility
- Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors
- Language
- eng
- Cataloging source
- EBLCP
- Dewey number
- 004.678
- Index
- no index present
- LC call number
- TK5105.8857
- LC item number
- .S43 2019
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
-
- Chakraborty, Rajat Subhra
- Mathew, Jimson
- Vasilakos, Athanasios
- Series statement
- Internet of Things: Technology, communications and computing
- http://library.link/vocab/subjectName
-
- Internet of things
- Fault-tolerant computing
- Label
- Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
- Note
- An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
- Antecedent source
- file reproduced from an electronic resource
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
- 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
- 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
- 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
- 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
- Dimensions
- unknown
- Extent
- 1 online resource (221 p.).
- File format
- one file format
- Form of item
- online
- Isbn
- 9783030028077
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- unknown
- Reformatting quality
- unknown
- Specific material designation
- remote
- System control number
-
- on1080085229
- (OCoLC)1080085229
- Label
- Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
- Note
- An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
- Antecedent source
- file reproduced from an electronic resource
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
- 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
- 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
- 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
- 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
- Dimensions
- unknown
- Extent
- 1 online resource (221 p.).
- File format
- one file format
- Form of item
- online
- Isbn
- 9783030028077
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- unknown
- Reformatting quality
- unknown
- Specific material designation
- remote
- System control number
-
- on1080085229
- (OCoLC)1080085229
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Security-and-fault-tolerance-in-Internet-of/18kjAOFKK1M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Security-and-fault-tolerance-in-Internet-of/18kjAOFKK1M/">Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Security-and-fault-tolerance-in-Internet-of/18kjAOFKK1M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Security-and-fault-tolerance-in-Internet-of/18kjAOFKK1M/">Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>