Abstract
Internet of Things (IoT) has attracted considerable attention, let alone acquaintance, in academia and industry in particular over the last few years. The factors behind this attraction are the new capabilities IoT is promising to deliver. On a human level, it creates an image of a future world in which everything in our ambient environment is hooked up to the internet and communicates seamlessly with each other in order to operate smartly. The ultimate aim is to allow objects around us to efficiently sense our environments, interact easily, and eventually create a better world for us: one where everyday objects behave on the basis of what we need and want without explicit orders. That being said, enabling devices to communicate to when they are not properly secured, the internet opens them up to a range of significant vulnerabilities. This research concentrates on security threats and vulnerabilities on each layer of IoT architecture. We survey a vast range of relevant IoT security works that use classical solutions and new emerging security solutions. The advantages of classical solutions are effective in optimizing resources such as memory, bandwidth and computing, but do not face the challenges of scalability and heterogeneity, While the emerging approaches like Software Based Networking and blockchain can offer to IoT through to their efficiency and scalability
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)
Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)
Kong, L., Khan, M.K., Wu, F., Chen, G., Zeng, P.: Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges. IEEE Commun. Mag. 55(1), 62–68 (2017)
Odelu, V., Das, A.K., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size Keys and ciphertexts. IEEE Access 5, 3273–3283 (2017)
Tewari, A., Gupta, B.B.: A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. Int. J. Adv. Intell. Paradigms 9(2–3), 111–121 (2017)
AbMalek, M.S.B., Ahmadon, M.A.B., Yamaguchi, S., Gupta, B.B.: On privacy verification in the IoT service based on PN 2. In: Proceedings of the Consumer Electronics, IEEE 5th Global Conference on 2016, pp. 1–4. IEEE (2016)
Yaqoob, I., Ahmed, E., Hashem, I.A.T., Ahmed, A.I.A., Gani, A., Imran, M., Guizani, M.: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 24, 10–16 (2017)
**g, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20, 2481–2501 (2014)
Ziegler, S.: Internet of Things Security and Data Protection. Springer International Publishing (2019)
Li, S., Li Da Xu.: Securing the internet of things, Syngress (2017)
Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener. Comput. Syst. 108, 909–920 (2020)
Mendez Mena, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Global Perspect. 27(3), 162–182 (2018)
Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)
Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–5. IEEE (2014)
Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260. IEEE (2012)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)
Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Network Comput. Appl. 88, 10–28 (2017)
Yang, X., Li, Z., Geng, Z., Zhang, H.: A multi-layer security model for internet of things. In: Wang, Y., Zhang, X. (eds.) IOT 2012. CCIS, vol. 312, pp. 388–393. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32427-7_54
Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S—a publish/subscribe protocol for Wireless Sensor Networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798. IEEE (2008)
**aohui, X.: Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pp. 407–410. IEEE (2013)
Fan, Y., et al.: SNPL: one scheme of securing nodes in iot perception layer. Sensors 20(4), 1090 (2020)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, vol. 3, pp. 648–651 (2012)
Rayes, A., Salam, S.: Internet of things from hype to reality. In: The Road to Digitization. River Publisher Series in Communications, vol. 49. Springer, Basel, Switzerland (2017)
Jabraeil Jamali, M.A., Bahrami, B., Heidari, A., Allahverdizadeh, P., Norouzi, F.: Towards the Internet of Things. EICC. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-18468-1
Husamuddin, M.; Qayyum, M.: Internet of Things: a study on security and privacy threats. In: Proceedings of the 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia, pp. 26–27 (2017)
Noura, H.: Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations: Design, Analyze and Lessons Learned. HDR dissertation, University of Pierre Marie Curie-Paris VI. (2016)
Yang, X., Lin, J., Yu, W., Moulema, P.M., Fu, X., Zhao, W.: A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Trans. Comput. 64(1), 4–18 (2013)
Hassan, W.H.: Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 148, 283–294 (2019)
Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks (2017)
Maheswari, S.U., Usha, N.S., Anita, E.M., Devi, K.R.: A novel robust routing protocol RAEED to avoid DoS attacks in WSN. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5. IEEE (2016)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Ragab, A., Selim, G., Wahdan, A., Madani, A.: Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 5–19. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_1
Abomhara, M., Koien, G.M.: Security and privacy in the Internet of Things: current status and open issues. In: International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8 (2014)
Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3, pp. 1062–1066 (2012)
Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in Internet of Things. In: Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China (2012)
Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 49–63 (2005)
Bharathi, M.V., Tanguturi, R.C., Jayakumar, C.; Selvamani, K.: Node capture attack in wireless sensor network: a survey. In: Proceedings of the 2012 IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Coimbatore, India, pp. 1–3. and Security (CIS) (2013)
Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, USA (2007)
Weixiong, Y., Robin, L., Kon Soon Seng, A.: Security and privacy concerns in wireless networks-a survey (2020)
Gomez, G., Lopez-Martinez, F.J., Morales-Jimenez, D., McKay, M.R.: On the equivalence between interference and eavesdrop** in wireless communications. IEEE Trans. Veh. Technol. 64(12), 5935–5994 (2015)
Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput. 3, 64–71 (2016)
Na, S., Hwang, D., Shin, W., Kim, K.H.: Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In: Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam, pp. 11–13 (2017)
Burhan, M., Rehman, R.A., Khan, B., Kim, B.S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)
Shahverdi, A., Taha, M., Eisenbarth, T.: Lightweight side channel resistance: threshold implementations of S imon. IEEE Trans. Comput. 66, 661–671 (2017)
Choi, J., Kim, Y.: An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system. In: Proceedings of the 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, Korea (2016)
Tawalbeh, L.A., Somani, T.F.: More secure Internet of Things using robust encryption algorithms against side channel attacks. In: Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco (2016)
Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701–771 (2005)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5), 491–505 (2010)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)
Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)
Kumar, S.A., Vealey, T., Srivastava, H.: Security in internet of things: Challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5772–5781. IEEE (2016)
Qureshi, K.N., et al.: A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain. Cities Soc. 61, 102343 (2020)
Kalnoor, G., Agarkhed, J.: Qos based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In: Proceedings of 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), March 2016
Anirudh, M., Thileeban, S.A., Nallathambi, D.J.: Use of honeypots for mitigating DOS attacks targeted on IoT networks. In: Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India (2017)
Choi, M.K., Robles, R.J., Hong, C.H., Kim, T.H.: Wireless network security: vulnerabilities, threats and countermeasures. Int. J. Multimed. Ubiquit. Eng. 3(3), 77–86 (2008)
Pacheco, L.A.B., Gondim, J.J.C., Barreto, P.A.S., Alchieri, E.: Evaluation of distributed denial of service threat in the internet of things. In: Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA (2016)
Machaka, P., Bagula, A., Nelwamondo, F.: Using exponentially weighted moving average algorithm to defend against DDoS attacks. In: Proceedings of the 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), Stellenbosch, South Africa (2016)
Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187. IEEE (2015)
Bok, B.G.J.: Innovating the retail industry: an IoT approach (Bachelor’s thesis, University of Twente) (2016)
Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 141, 199–221 (2018)
Al-Turjman, F., Alturjman, S.: Confidential smart-sensing framework in the IoT era. J upercomput 74, 5187–5198 (2018)
Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, RProposed embedded security framework for internet of things (IoT). In: 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5 (2011)
Chandra, S., et al.: A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE). IEEE (2014)
Seyyedi, S.A., Sadau, V., Ivanov, N.: A secure steganography method based on integer lifting wavelet transform. IJ Netw. Secur. 18(1), 124–132 (2016)
Biryukov, Alex., Dinu, Daniel, Le Corre, Yann: Side-channel attacks meet secure network protocols. In: Gollmann, Dieter, Miyaji, Atsuko, Kikuchi, Hiroaki (eds.) ACNS 2017. LNCS, vol. 10355, pp. 435–454. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61204-1_22
He, D., Bu, J., Zhu, S., Chan, S., Chen, C.: Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wireless Commun. 10(10), 3472–3481 (2011)
Thirumalai, C., Mohan, S., Srivastava, G.: An efficient public key secure scheme for cloud and IoT security. Comput. Commun. 150, 634–643 (2020)
Chhabra, A., Arora, S.: An elliptic curve cryptography based encryption scheme for securing the cloud against eavesdrop** attacks. In: 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 243–246. IEEE (2017).
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Kumar, P.V., Aluvalu, R.: Key-Policy Attribute Based Encryption (KP-ABE). In: International Journal of Innovative and Emerging Research in Engineering 2.2 (2015).
Sara, A., Yassine, T., Abdellatif, M.: Secure confidential big data sharing in cloud computing using KP-ABE. In: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, pp. 1–4 (2017)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007).
Chen, W.: An IBE-based security scheme on internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3, pp. 1046–1049. IEEE (2012)
Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE (2016)
Chatzigiannakis, I., Pyrgelis, A., Spirakis, P.G., Stamatiou, Y.C.: Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 715–720. IEEE (2011)
Jadhav, S.P., Balabanov, G., Poulkov, V., Shaikh, J.R.: Enhancing the security and efficiency of resource constraint devices in IoT. In: 2020 International Conference on Industry 4.0 Technology (I4Tech), pp. 163–166. IEEE (2020)
Bruening, P.J., Waterman, K.K.: Data tagging for new information governance models. IEEE Secur. Priv. 8(5), 64–68 (2010)
Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. In: 2012 IEEE International Conference on Green Computing and Communications, pp. 244–248. IEEE (2012)
Ahn, S., Oh, H., Kim, H.J., Choi, J.K.: Data lifecycle and tagging for Internet of Things applications. In: Kang, B.H., Bai, Q. (eds.) AI 2016. LNCS (LNAI), vol. 9992, pp. 691–695. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-50127-7_61
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754–762. IEEE (2014
Li, H.T., Ma, J.F., Fu, S.: A privacy-preserving data collection model for digital community. Sci. China Inf. Sci. 58(3), 1–16 (2014)
Huo-wang, W., Cheng, Z.H.O.N.G.: Parallel clustering-based k-anonymity algorithm in internet of things. Inf. Technol. 12, 003 (2013)
Tonyali, S., Cakmak, O., Akkaya, K., Mahmoud, M.M., Guvenc, I.: Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks. IEEE Internet Things J. 3(5), 709–719 (2015)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Maleh, Y., Ezzati, A., Belaissaoui, M.: Dos attacks analysis and improvement in dtls protocol for internet of things. In: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, pp. 1–7 (2016)
Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6lowpan based internet of things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 600–607 (2013)
Rathore, S., Pan, Y., Park, J.H.: BlockDeepNet: a Blockchain-based secure deep learning for IoT network. Sustainability 11(14), 3974 (2019)
Atlam, H.F., Walters, R.J., Wills, G.B.: Intelligence of things: opportunities & challenges. In: 2018 3rd Cloudification of the Internet of Things (CIoT), pp. 1–6. IEEE (2018)
Hodo, E., Bellekens, X., Hamilton, A.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, pp. 1–6 (2016)
Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wirel. Commun. Networking 2018, 113 (2018)
Amores, J., Maes, P., Paradiso, J.: Binary: detecting the state of organic trash to prevent insalubrity. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, pp. 313–316 (2015)
Han, M.L., Lee, J., Kang, A.R., Kang, S., Park, J.K., Kim, H.K.: A statistical-based anomaly detection method for connected cars in internet of things environment. In: Hsu, C.-H., **a, F., Liu, X., Wang, S. (eds.) IOV 2015. LNCS, vol. 9502, pp. 89–97. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27293-1_9
Islam, M.J., Mahin, M., Roy, S., Debnath, B.C., Khatun, A.: Distblacknet: a distributed secure black sdn-iot architecture with nfv implementation for smart cities. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–6. IEEE (2019)
Iqbal, W., et al.: An in-depth analysis of IoT security requirements, challenges and their countermeasures via software defined security. IEEE Internet Things J. PP(99) 1 (2020)
Krishnan, Prabhakar., Najeem, Jisha S., Achuthan, Krishnashree: SDN framework for securing IoT networks. In: Kumar, Navin, Thakre, Arpita (eds.) UBICNET 2017. LNICST, vol. 218, pp. 116–129. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73423-1_11
Sood, K., Yu, S., **ang, Y.: Software-defined wireless networking opportunities and challenges for Internet-of-Things: a review. IEEE Internet Things J. 3(4), 453–463 (2015)
Bull, P., Austin, R., Sharma, M.: Pre-emptive flow installation for internet of things devices within software defined networks. In: 2015 3rd International Conference on Future Internet of Things and Cloud, pp. 124–130. IEEE (2015)
Singh, Pranav Kumar., Singh, Roshan., Nandi, Sunit Kumar, Nandi, Sukumar: Designing a blockchain based framework for IoT data trade. In: Rautaray, Siddharth Swarup, Eichler, Gerald, Erfurth, Christian, Fahrnberger, Günter (eds.) I4CS 2020. CCIS, vol. 1139, pp. 295–308. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-37484-6_17
Atlam, H.F., et al.: Blockchain with internet of things: Benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10(6), 40–48 (2018).
Kshetri, N.: Can blockchain strengthen the Internet of Things? IT Prof. 19(4), 68–72 (2017)
Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in internet of things: challenges and solutions. ar**v preprint ar**v:1608.05187 (2016)
Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 88, 173–190 (2018)
Zheng, Z., **e, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. IEEE Int. Congress Big Data 2017, 557–564 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Baker, S.A., Nori, A.S. (2021). Internet of Things Security: A Survey. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_7
Download citation
DOI: https://doi.org/10.1007/978-981-33-6835-4_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6834-7
Online ISBN: 978-981-33-6835-4
eBook Packages: Computer ScienceComputer Science (R0)