000778778 000__ 05551cam\a2200541Ii\4500 000778778 001__ 778778 000778778 005__ 20230306142854.0 000778778 006__ m\\\\\o\\d\\\\\\\\ 000778778 007__ cr\nn\nnnunnun 000778778 008__ 170104s2017\\\\sz\\\\\\o\\\\\000\0\eng\d 000778778 019__ $$a974650723$$a981108828 000778778 020__ $$a9783319507583$$q(electronic book) 000778778 020__ $$a3319507583$$q(electronic book) 000778778 020__ $$z9783319507569 000778778 0247_ $$a10.1007/978-3-319-50758-3$$2doi 000778778 035__ $$aSP(OCoLC)ocn967656031 000778778 035__ $$aSP(OCoLC)967656031$$z(OCoLC)974650723$$z(OCoLC)981108828 000778778 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dIDEBK$$dEBLCP$$dGW5XE$$dN$T$$dYDX$$dAZU$$dUAB$$dCOO$$dCNCGM$$dOCLCF$$dUPM$$dIOG$$dVT2$$dUWO 000778778 049__ $$aISEA 000778778 050_4 $$aTK5105.8857 000778778 08204 $$a004.67/8$$223 000778778 24500 $$aBeyond the Internet of Things :$$beverything interconnected /$$cJordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors. 000778778 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2017] 000778778 300__ $$a1 online resource. 000778778 336__ $$atext$$btxt$$2rdacontent 000778778 337__ $$acomputer$$bc$$2rdamedia 000778778 338__ $$aonline resource$$bcr$$2rdacarrier 000778778 347__ $$atext file$$bPDF$$2rda 000778778 4901_ $$aInternet of things, Technology, communications and computing,$$x2199-1073 000778778 5050_ $$aIntroduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary 000778778 5058_ $$aAcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties 000778778 5058_ $$a4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview of Internet of Things Security; 2.2 Security Goals for the Internet of Things; 2.2.1 Confidentiality; 2.2.2 Integrity; 2.2.3 Availability; 2.2.4 Authentication; 2.2.5 Access Control; 2.2.6 Non-repudiation; 2.2.7 Secure Booting 000778778 5058_ $$a2.2.8 Device Tampering Detection2.3 Where Internet of Things Security Becomes Delicate; 2.3.1 Challenges of Implementing Security for IoT; 2.3.2 Hardware Issues; 2.4 Size and Heterogeneity of Things; 2.4.1 Size of IoT; 2.4.2 Heterogeneity of the IoT; 2.5 Privacy Concerns in the Internet of Things; 3 Fundamental Internet of Things Security Issues; 3.1 Things Are not Designed with Security in Mind; 3.1.1 Testing the Security of IoT Devices; 3.2 Open Debugging Interfaces; 3.3 Inappropriate Network Configuration and Use of Default Passwords by Users 000778778 5058_ $$a3.4 Lack of Encryption of Critical Information Before Storage3.5 Current and Emerging IoT Cyber Threat Landscape; 3.5.1 Internet of Things Cyber Assets; 3.5.2 Vulnerabilities Associated with IoT Devices; 3.6 Overview of Internet of Things Threat Agents; 4 IoT Security Issues that Need Immediate Attention; 4.1 Efficient Lightweight Authentication Schemes for IoT; 4.2 Robust and Flexible Lightweight Cryptography; 4.3 Need for Efficient Key Revocation Schemes; 4.4 Need for Standardization of Security Solutions; 5 Conclusions; Acknowledgments; References; Technologies for Connecting Everything 000778778 506__ $$aAccess limited to authorized users. 000778778 520__ $$aThe major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions. 000778778 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 11, 2017). 000778778 650_0 $$aInternet of things. 000778778 7001_ $$aBatalla, Jordi Mongay,$$eeditor. 000778778 7001_ $$aMastorakis, George,$$d1978-$$eeditor. 000778778 7001_ $$aMavromoustakis, Constandinos X.,$$d1974-$$eeditor. 000778778 7001_ $$aPallis, Evangelos,$$d1971-$$eeditor. 000778778 77608 $$iPrint version:$$z9783319507569 000778778 830_0 $$aInternet of things. 000778778 852__ $$bebk 000778778 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-50758-3$$zOnline Access$$91397441.1 000778778 909CO $$ooai:library.usi.edu:778778$$pGLOBAL_SET 000778778 980__ $$aEBOOK 000778778 980__ $$aBIB 000778778 982__ $$aEbook 000778778 983__ $$aOnline 000778778 994__ $$a92$$bISE