Security issues and privacy threats in smart ubiquitous computing

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the rea...

Full description

Other Authors: Mahalle, Parikshit N.,, Shinde, Gitanjali Rahul, 1983-, Dey, Nilanjan, 1984-, Hassanien, Aboul Ella,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Singapore : Springer, [2021]
Physical Description: 1 online resource (xxi, 246, C1 pages).
Series: Studies in systems, decision and control ; v. 341.
Subjects:
Table of Contents:
  • Part I.
  • Threats and Issues in Ubiquitous Computing
  • Introduction
  • Taxonomy of threats to ubiquitous computing
  • Cyber Crime and Their Restriction Through Laws and Techniques for Protecting Security Issues and Privacy Threats
  • Recent challenges in IoT
  • Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead
  • Part II.
  • Security Measures and Frameworks
  • OAuth-Based Authorization and Delegation in Smart Home for the Elderly Using Decentralized Identifiers and Verifiable Credentials
  • Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment
  • Distributed Access Control Scheme for Machine-to-Machine Communication in IoT Using Trust Factor
  • Game Theory Approach for Trust Management in the Realm of IoT
  • Ransomware Attack Detection and Prevention for Android Devices
  • A Comparative Analysis of Machine Deep Learning Algorithms for Intrusion Detection in WSN
  • Base for Trust Score Estimation for Device to Device Communication in Internet of Thing Using Fuzzy Approach and Machine Learning
  • Systematic Review of Resource Allocation Methods Using Scheduling for M2M (Machine to Machine Communication) in IoT Network
  • Part III.
  • Social Aspects of Smart Ubiquitous Computing
  • Sarcasm Detection in Online Social Network: Myths, Realities, and Issues
  • Farmer-Assistive Chatbot in Indian Context Using Learning Techniques
  • Correction to: A Comparative Analysis of Machine Enep Learning Algorithms for Intrusion Entection in WSN.
  • Taxonomy of Threats to Ubiquitous Computing
  • Cyber Crime and Their Restriction through Laws and Techniques for Protecting Security Issues and Privacy Threats
  • Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges and Road Map ahead
  • Dynamic Access control Solution for Cross-tenancy in a Cloud Environment
  • Game Theory Approach for Trust Management in the realm of IoT
  • A Comparative Analysis of Machine and Deep Learning Algorithms for Intrusion Detection in WSN
  • Sarcasm Detection in Online Social Network Myths, Realities and Issues
  • Farmer assistive chatbot in Indian context using learning techniques.