http://iet.metastore.ingenta.com
1887

Security in consumer electronics and internet of things (IoT)

Security in consumer electronics and internet of things (IoT)

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IP Core Protection and Hardware-Assisted Security for Consumer Electronics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In a typical consumer electronics generation, diverse forms of attacks exist, e.g., system security, information security, information privacy, system trustworthiness, hardware IP protection, information copyright protection. Each of the attacks have their own threats and serve different purposes. The objective of this chapter is to differentiate each of these attacks in the context of internet of things (IoT). IoT is a very hot, trending topic of research, where different devices, sensors, and computers are connected to a network, collect data, and process for different purposes. A network of devices and sensors connected to the cloud can complete many unimaginable tasks, and without the existence of cloud, almost all task would have been very difficult to achieve and complete. Since, most connectivity occurs in cloud, there is always a probability of security and privacy threats. Because all types of the different devices are connected to the internet, attackers pose a huge threat to the system. For example, if any electronic system that is responsible for home care, healthcare, running an entire city, etc., are attacked, then the consequence of this threat will be a major catastrophe.

Chapter Contents:

  • 2.1 Internet of things (IoT) – a broad overview
  • 2.1.1 IoT – architecture
  • 2.1.2 IoT – driving technology
  • 2.1.3 IoT – applications
  • 2.1.4 IoT – challenges
  • 2.2 Security, privacy, IPR in IoT, and consumer electronic systems – a big picture
  • 2.2.1 IoT security – attacks and countermeasures
  • 2.2.2 Trustworthy consumer electronic systems
  • 2.2.3 Hardware-assisted security and protection
  • 2.2.4 Different aspects of security and privacy
  • 2.2.5 Different aspects of intellectual property (IP), ownership right, or copyright protection
  • 2.3 Memory security
  • 2.3.1 Memory security attacks
  • 2.3.2 Memory security solutions
  • 2.4 Radio-frequency identification (RFID) security
  • 2.4.1 RFID security attacks
  • 2.4.2 RFID security solutions
  • 2.5 Near-field communications (NFC) security
  • 2.5.1 NFC security attacks
  • 2.5.2 NFC security solutions
  • 2.6 Smart transportation security
  • 2.6.1 Smart car security
  • 2.6.1.1 Smart car security attacks
  • 2.6.1.2 Smart car security solutions
  • 2.6.2 UAV or drone security
  • 2.6.2.1 UAV security attacks
  • 2.6.2.2 UAV security solutions
  • 2.7 Smart healthcare security
  • 2.7.1 Smart healthcare security attacks
  • 2.7.2 Smart healthcare security solutions
  • 2.8 Firmware
  • 2.8.1 Firmware attacks
  • 2.8.2 Firmware solutions
  • 2.9 Blockchain technology
  • 2.9.1 Blockchain – overview
  • 2.9.2 Blockchain – application
  • 2.9.3 Blockchain as a security framework
  • 2.9.4 Blockchain – issues
  • 2.10 Conclusions
  • 2.11 Exercises
  • References

Inspec keywords: computer network security; cloud computing; Internet of Things; trusted computing; consumer electronics; data privacy

Other keywords: information privacy; Internet-of-Things; system security; system trustworthiness; information security; IoT; information copyright protection; cloud; hardware IP protection; consumer electronics

Subjects: Internet software; Computer networks and techniques; Computer communications; Data security

Preview this chapter:
Zoom in
Zoomout

Security in consumer electronics and internet of things (IoT), Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch2-1.gif /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch2-2.gif

Related content

content/books/10.1049/pbcs060e_ch2
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address