Ubiquitous Computing and Computing Security of IoT

  • N. Jeyanthi
  • Ajith Abraham
  • Hamid Mcheick

Part of the Studies in Big Data book series (SBD, volume 47)

Table of contents

  1. Front Matter
    Pages i-v
  2. J. Cynthia, H. Parveen Sultana, M. N. Saroja, J. Senthil
    Pages 1-28
  3. Rakesh Bandarupalli, H. Parveen Sultana
    Pages 29-52
  4. Salsabeel Shapsough, Imran A. Zualkernan
    Pages 53-68
  5. R. Vijayan, Jeyanthi N.
    Pages 69-99

About this book


This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.


IoT Security Internet of Things Security Pervasive Computing Mobile Computing Ubicomp IT Security Cybersecurity

Editors and affiliations

  • N. Jeyanthi
    • 1
  • Ajith Abraham
    • 2
  • Hamid Mcheick
    • 3
  1. 1.School of Information Technology and EngineeringVIT UniversityVelloreIndia
  2. 2.Scientific Network for Innovation and Research ExcellenceMachine Intelligence Research Labs (Mir Labs)AuburnUSA
  3. 3.Université du Québec à ChicoutimiChicoutimiCanada

Bibliographic information

  • DOI
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Engineering Engineering (R0)
  • Print ISBN 978-3-030-01565-7
  • Online ISBN 978-3-030-01566-4
  • Series Print ISSN 2197-6503
  • Series Online ISSN 2197-6511
  • Buy this book on publisher's site