The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis.
Technical topics discussed in the book include: Internet of Things; Identity Management; Identity models in Internet of Things; Identity management and trust in the Internet of Things context; Authentication and access control; Identity management for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identity management and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control. Key milestones identified for Identity management are clustering with hierarchical addressing, trust management, mutual authentication and access control.
Identity management for Internet of Things is ideal for personnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering and telecommunication systems Internet, and cloud computing.
Preface; 1. Internet of Things Overview; 2. Elements of Internet of Things Security; 3. Identity Management Models; 4. Identity Management and Trust; 5. Identity Establishment; 6. Access Control; 7. Conclusions.
Number Of Pages:
- ID: 9788793102903
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2016 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36