on id="u6ece8361-afde-565d-a53f-7f2d101efb56">
Table of Contents
1 Cover
4 Preface
6 1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1.1 Introduction 1.2 Growth of IoT 1.3 IoT Technologies 1.4 Application Areas of Internet of Things 1.5 IoT Security and Protection Concerns 1.6 IoT Security 1.7 Conclusion References
7 2 Blockchain in IoT and Limitations 2.1 Introduction 2.2 Literature Review 2.3 Limitations of Blockchain 2.4 Conclusion References
8 3 IoT Protocol Security Mechanisms 3.1 Introduction 3.2 Comparing to IoT Security and Cyber-Physical Structures 3.3 Potential IoT and the Need for Safety 3.4 Future-Cognitive Structures and IoT 3.5 Security Engineering for IoT Development 3.6 Building Security into Design and Development 3.7 Security in Agile Developments 3.8 Focusing on the IoT Device in Operation 3.9 IoT Security Innovation Cryptographic Basics 3.10 Cryptographic Primitive Forms and Implementations in the IoT 3.11 Encryption and Decryption 3.12 Hashes 3.13 Digital Signatures 3.14 Generation of Random Numbers 3.15 Cloud Security for IoT 3.16 Control of Assets/Inventories Conclusion References
9 4 IoT Security, Privacy, Challenges, and Solutions 4.1 Introduction 4.2 IoT Landscape: Current and Potential Applications 4.3 Advantages of Internet of Things (IoT) 4.4 Architecture of IoT Systems 4.5 IoT Security 4.6 Security Challenges in IoT Architecture 4.7 Security by Design in IoT 4.8 Best Practices to Secure IoT Devices 4.9 Security Attacks in IoT System 4.10 Various IoT Security Challenges 4.11 Limitations of Available Resources 4.12 Solutions to Preserve Privacy in IoT Systems Conclusions References
10 5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 5.1 Introduction 5.2 Cyber Physical System: Definition 5.3 System Interfaces 5.4 Communication Channel 5.5 Physical Interaction 5.6 CPS vs IoT 5.7 Cyber Physical System Issues 5.8 Literature Survey 5.9 Applications of Cyber Physical System 5.10 Future of Cyber Physical Systems 5.11 Conclusion References
11 6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 6.1 Introduction 6.2 Related Works 6.3