Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Resource Information
The instance Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book) represents a material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
The Resource
Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Resource Information
The instance Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book) represents a material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool. This resource is a combination of several types including: Instance, Electronic.
- Label
- Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
- Medium
- electronic book
- Statement of responsibility
- Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors
- Note
- An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT
- Antecedent source
- file reproduced from an electronic resource
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark
- 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability
- 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice
- 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
- 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References
- Dimensions
- unknown
- Extent
- 1 online resource (221 p.).
- File format
- one file format
- Form of item
- online
- Isbn
- 9783030028077
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- unknown
- Record ID
- b5550030
- Reformatting quality
- unknown
- Specific material designation
- remote
- System control number
-
- on1080085229
- (OCoLC)1080085229
Context
Context of Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)Instantiates
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/18kjAOFKK1M/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/18kjAOFKK1M/">Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/18kjAOFKK1M/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/18kjAOFKK1M/">Security and fault tolerance in Internet of Things, Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>