001454088 000__ 03336cam\a22004697a\4500 001454088 001__ 1454088 001454088 003__ OCoLC 001454088 005__ 20230314003500.0 001454088 006__ m\\\\\o\\d\\\\\\\\ 001454088 007__ cr\un\nnnunnun 001454088 008__ 230127s2023\\\\sz\\\\\\ob\\\\001\0\eng\d 001454088 019__ $$a1366111740 001454088 020__ $$a3031241851$$q(electronic bk.) 001454088 020__ $$a9783031241857$$q(electronic bk.) 001454088 0247_ $$a10.1007/978-3-031-24185-7$$2doi 001454088 035__ $$aSP(OCoLC)1363100400 001454088 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP 001454088 049__ $$aISEA 001454088 050_4 $$aTK7881.25 001454088 08204 $$a643/.6028558$$223/eng/20230127 001454088 1001_ $$aMeng, Yan,$$eauthor. 001454088 24510 $$aSecurity in smart home networks /$$cYan Meng, Haojin Zhu, Xuemin (Sherman) Shen. 001454088 260__ $$aCham, Switzerland :$$bSpringer,$$c2023. 001454088 300__ $$a1 online resource 001454088 4901_ $$aWireless Networks,$$x2366-1445 001454088 504__ $$aIncludes bibliographical references and index. 001454088 5050_ $$aIntroduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. 001454088 506__ $$aAccess limited to authorized users. 001454088 520__ $$aThis book presents the security and privacy challenges of the smart home following the logic of "terminal device voice interface application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart homes security and privacy issues. 001454088 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 27, 2023). 001454088 650_0 $$aHome automation$$xSecurity measures. 001454088 650_0 $$aInternet of things$$xSecurity measures. 001454088 655_0 $$aElectronic books. 001454088 7001_ $$aZhu, Haojin,$$d1980-$$eauthor. 001454088 7001_ $$aShen, X.$$q(Xuemin),$$d1958-$$eauthor. 001454088 830_0 $$aWireless networks (Springer (Firm)),$$x2366-1445 001454088 852__ $$bebk 001454088 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-24185-7$$zOnline Access$$91397441.1 001454088 909CO $$ooai:library.usi.edu:1454088$$pGLOBAL_SET 001454088 980__ $$aBIB 001454088 980__ $$aEBOOK 001454088 982__ $$aEbook 001454088 983__ $$aOnline 001454088 994__ $$a92$$bISE