Skip to main content
  • Book
  • © 2017

Secure and Privacy-Preserving Data Communication in Internet of Things

  • Summarizes the latest technology in data security and privacy in the Internet of Things
  • Provides the source code for all the new technologies in the wireless sensor network, smart grid and vehicular ad-hoc network applications
  • Clarifies the differences between the security of all the cryptographic-based schemes
  • Includes supplementary material: sn.pub/extras

Part of the book series: SpringerBriefs in Electrical and Computer Engineering (BRIEFSELECTRIC)

Part of the book sub series: SpringerBriefs in Signal Processing (BRIEFSSIGNAL)

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (5 chapters)

  1. Front Matter

    Pages i-vii
  2. Introduction

    • Liehuang Zhu, Zijian Zhang, Chang Xu
    Pages 1-2
  3. Secure Data Aggregation in Wireless Sensor Networks

    • Liehuang Zhu, Zijian Zhang, Chang Xu
    Pages 3-31
  4. Privacy-Preserving Meter Reading Transmission in Smart Grid

    • Liehuang Zhu, Zijian Zhang, Chang Xu
    Pages 33-52
  5. Security and Privacy Preservation in VANET

    • Liehuang Zhu, Zijian Zhang, Chang Xu
    Pages 53-76
  6. Conclusion

    • Liehuang Zhu, Zijian Zhang, Chang Xu
    Pages 77-78

About this book


This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT afterreading this book.

Authors and Affiliations

  • Beijing Institute of Technology , Haidian, China

    Liehuang Zhu, Zijian Zhang, Chang Xu

About the authors


Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.

Zijian Zhangis an assistant professor in the School of Computer Science and
Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young
Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.

Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication  Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on " Security and Privacy Challenges in Vehicular Cloud Computing", 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.


Bibliographic Information

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access