menu
{ "item_title" : "Security in Smart Home Networks", "item_author" : [" Yan Meng", "Haojin Zhu", "Shen "], "item_description" : "This book presents the security and privacy challenges of the smart home following the logic of terminal device - voice interface - application platform. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/124/187/3031241878_b.jpg", "price_data" : { "retail_price" : "139.99", "online_price" : "139.99", "our_price" : "139.99", "club_price" : "139.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Security in Smart Home Networks|Yan Meng

Security in Smart Home Networks

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

This item is Non-Returnable

Details

  • ISBN-13: 9783031241871
  • ISBN-10: 3031241878
  • Publisher: Springer
  • Publish Date: January 2024
  • Dimensions: 9.21 x 6.14 x 0.38 inches
  • Shipping Weight: 0.57 pounds
  • Page Count: 167

Related Categories

You May Also Like...

    1

BAM Customer Reviews