TY - BOOK AU - Fotia,Lidia AU - Messina,Fabrizio AU - Rosaci,Domenico AU - Sarné,Giuseppe M.L. ED - SpringerLink (Online service) TI - Security, Trust and Privacy Models, and Architectures in IoT Environments T2 - Internet of Things, Technology, Communications and Computing, SN - 9783031219405 AV - TK5101-5105.9 U1 - 621.382 23 PY - 2023/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Telecommunication KW - Cooperating objects (Computer systems) KW - Data protection KW - Communications Engineering, Networks KW - Cyber-Physical Systems KW - Data and Information Security N1 - Acceso multiusuario; Chapter 1. IoT Network administration by intelligent decision support based on combined neural networks -- Chapter 2. A Novel Privacy-Preserving Framework based on Blockchain Technology to Secure Industrial IoT Data -- Chapter 3. Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model -- Chapter 4. An Adaptive Blurring Routing Protocol for Delay Tolerant Networks in IoT Environments -- Chapter 5. Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks -- Chapter 6. Machine learning methologies for preventing malware obfuscation -- Chapter 7. Formation of Reliable Composite Teams for Collaborative Environmental Surveillance of Ecosystems -- Chapter 8. Accountability of IoT devices -- Chapter 9. Digital twin through physical assets tokenization in blockchain -- Chapter 10. Security in Home Automation N2 - This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students. Covers the issues of security, trust and privacy models, reputation, and architectures in IoT environments; Includes IoT security applications in different domains to offer services for smart home and cities, smart grid, smart community, e-Commerce, and many others; Presents positioning of software agent technologies and the integration of edge computing to help tackle security issues in IoT UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-21940-5 ER -