Trust-Based Communication Systems for Internet of Things Applications (eBook, ePUB)
Redaktion: Agrawal, Prateek; Kautish, Sandeep; Agrawal, Akshat; Sharma, Dilip Kumar; Sharma, Anand; Madaan, Vishu
Alle Infos zum eBook verschenken
Trust-Based Communication Systems for Internet of Things Applications (eBook, ePUB)
Redaktion: Agrawal, Prateek; Kautish, Sandeep; Agrawal, Akshat; Sharma, Dilip Kumar; Sharma, Anand; Madaan, Vishu
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 10.31MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 336
- Erscheinungstermin: 1. Juli 2022
- Englisch
- ISBN-13: 9781119896722
- Artikelnr.: 64293076
- Verlag: John Wiley & Sons
- Seitenzahl: 336
- Erscheinungstermin: 1. Juli 2022
- Englisch
- ISBN-13: 9781119896722
- Artikelnr.: 64293076
Book Description xv
1 An Analysis of the Internet of Things (IoT) as the Defining Technology of
a Generation 1
Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh
1.1 Introduction 1
1.2 Growth of IoT 2
1.3 IoT Technologies 3
1.4 Application Areas of Internet of Things 4
1.5 IoT Security and Protection Concerns 11
1.6 IoT Security 12
1.7 Conclusion 12
2 Blockchain in IoT and Limitations 17
Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta,
Anand Sharma and Akshat Agrawal
2.1 Introduction 18
2.2 Literature Review 22
2.3 Limitations of Blockchain 23
2.4 Conclusion 24
3 IoT Protocol Security Mechanisms 29
D. Karthika and Dr. K. Kalaiselvi
3.1 Introduction 30
3.2 Comparing to IoT Security and Cyber-Physical Structures 31
3.3 Potential IoT and the Need for Safety 32
3.4 Future-Cognitive Structures and IoT 32
3.5 Security Engineering for IoT Development 33
3.6 Building Security into Design and Development 34
3.7 Security in Agile Developments 35
3.8 Focusing on the IoT Device in Operation 36
3.9 IoT Security Innovation Cryptographic Basics 37
3.10 Cryptographic Primitive Forms and Implementations in the IoT 37
3.11 Encryption and Decryption 38
3.12 Hashes 41
3.13 Digital Signatures 42
3.14 Generation of Random Numbers 43
3.15 Cloud Security for IoT 44
3.16 Control of Assets/Inventories 45
4 IoT Security, Privacy, Challenges, and Solutions 53
Ankit Garg, Ashima Gambhir and Prachi Goel
4.1 Introduction 54
4.1.1 Elements of Internet of Things (IoT) 55
4.2 IoT Landscape: Current and Potential Applications 56
4.3 Advantages of Internet of Things (IoT) 59
4.4 Architecture of IoT Systems 60
4.5 IoT Security 63
4.6 Security Challenges in IoT Architecture 66
4.7 Security by Design in IoT 71
4.8 Best Practices to Secure IoT Devices 71
4.9 Security Attacks in IoT System 73
4.10 Various IoT Security Challenges 78
4.11 Limitations of Available Resources 79
4.12 Solutions to Preserve Privacy in IoT Systems 83
5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System
93
Gaurav Jolly and Rahul Johari
5.1 Introduction 93
5.2 Cyber Physical System: Definition 95
5.3 System Interfaces 96
5.4 Communication Channel 98
5.5 Physical Interaction 100
5.6 CPS vs IoT 102
5.7 Cyber Physical System Issues 104
5.8 Literature Survey 106
5.9 Applications of Cyber Physical System 108
5.10 Future of Cyber Physical Systems 115
5.11 Conclusion 116
6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF
Methodology 119
Sivasankari Narasimhan
6.1 Introduction 119
6.2 Related Works 121
6.3 Trust Calculation Basics 123
6.4 Deriving Trust Relationships 127
6.5 Trust Derivation Examples 128
6.6 Combination of Trust Relationship 130
6.7 Analysis of Attacks 131
6.8 Conclusions 132
7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data
Management 135
Prachi Goyal, Ankit Garg and Prakhar Jindal
7.1 Introduction 136
7.2 Literature Review 138
7.3 Overview of System Architecture 140
7.4 Experiments and Comparison 142
7.5 Database for Experiment 143
7.6 Assessment of the Index Structure 144
7.7 Performance Evaluation of Exact Search 147
7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search 148
7.9 Evaluation of Data Distribution 152
7.10 Conclusion 153
8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance
and Impact 159
Nabeela Hasan and Mansaf Alam
8.1 Introduction 160
8.2 An Efficient Approach Towards IIoT Technology 161
8.3 Evolution of IIoT 163
8.4 IIoT Architecture 165
8.5 Industrial Applications of IoT 172
8.6 Smart Manufacturing 172
8.7 Smart Healthcare 173
8.8 Smart Transportation 174
8.9 Smart Cities 174
8.10 Oil and Gas Industry 175
8.11 Logistics and Supply Chain 176
8.12 Basic Technologies of IIoT 177
8.13 Things Over Internet 178
8.14 Technology on Blockchain 178
8.15 Computing of Data Over Cloud Technology 178
8.16 Artificial Intelligence and Cyber Physical Systems 179
8.17 Analytics on Management of Big Data 179
8.18 Future Technologies: Augmented and Virtual Reality 180
8.19 Industry 4.0 180
8.20 Research Challenges 187
8.20.1 Energy Efficiency 187
8.20.2 Coexistence and Interoperability 187
8.20.3 Real-Time Performance 188
8.20.4 Security and Privacy 189
8.20.5 Fault Detection and Reconfiguration 189
8.20.6 User-Friendliness in Product Deployment and Usage 190
8.21 Conclusions 190
9 Evolving Trends of Artificial Intelligence and Robotics in Smart City
Applications: Crafting Humane Built Environment 195
Niva Rana Mahanta and Suvarna Lele
9.1 Fundamentals of Smart Cities 196
9.2 Case Study Analysis 209
9.3 Smart Buildings in Smart Cities: Humane Approach 225
9.4 Future Scope and Impact on Society 232
9.5 Conclusion 235
10 T-Secure IoT in Smart Home System 243
Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS
10.1 Introduction 244
10.2 Literature 245
10.3 Method 254
10.4 Chematic Implementation 260
10.5 Simulation and Result 260
10.6 Conclusion 260
11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport
267
Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan
11.1 Introduction 268
11.2 Intelligent Transport System 269
11.3 Technologies Used in Intelligent Transport Systems 270
11.4 Micro Mobility 272
11.5 Case Study 276
11.6 Methodology: Value -- Steam Mapping the Existing Operations 276
11.7 Operational Challenges Faced by Arnab Micro Mobility 281
11.8 Conclusion 287
12 Automatic Booking of LPG and Leakage Detection System Using IoT 291
Aishwarya Jain, Meghana H M and Annaiah H
12.1 "What is IoT?" 292
12.2 Why IoT Matters 292
12.2.1 Collecting and Sending Information 293
12.2.2 Receiving and Acting on Information 293
12.2.3 Doing Both: The Goal of an IoT System 294
12.3 The oneM2M IoT Standardized Architecture 294
12.4 The IoT World Forum (IoTWF) Standardized Architecture 296
12.5 A Simplified IoT Architecture 299
12.6 Case Study: Automatic LPG Booking and Leakage Detection System using
IoT 302
12.6.1 Problem Statement 302
12.6.2 Proposed Solution 303
12.6.3 Architecture of the System 304
12.6.4 System Setup 308
12.6.5 Working of System 308
12.7 Conclusion 310
References 310
Index 313
Book Description xv
1 An Analysis of the Internet of Things (IoT) as the Defining Technology of
a Generation 1
Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh
1.1 Introduction 1
1.2 Growth of IoT 2
1.3 IoT Technologies 3
1.4 Application Areas of Internet of Things 4
1.5 IoT Security and Protection Concerns 11
1.6 IoT Security 12
1.7 Conclusion 12
2 Blockchain in IoT and Limitations 17
Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta,
Anand Sharma and Akshat Agrawal
2.1 Introduction 18
2.2 Literature Review 22
2.3 Limitations of Blockchain 23
2.4 Conclusion 24
3 IoT Protocol Security Mechanisms 29
D. Karthika and Dr. K. Kalaiselvi
3.1 Introduction 30
3.2 Comparing to IoT Security and Cyber-Physical Structures 31
3.3 Potential IoT and the Need for Safety 32
3.4 Future-Cognitive Structures and IoT 32
3.5 Security Engineering for IoT Development 33
3.6 Building Security into Design and Development 34
3.7 Security in Agile Developments 35
3.8 Focusing on the IoT Device in Operation 36
3.9 IoT Security Innovation Cryptographic Basics 37
3.10 Cryptographic Primitive Forms and Implementations in the IoT 37
3.11 Encryption and Decryption 38
3.12 Hashes 41
3.13 Digital Signatures 42
3.14 Generation of Random Numbers 43
3.15 Cloud Security for IoT 44
3.16 Control of Assets/Inventories 45
4 IoT Security, Privacy, Challenges, and Solutions 53
Ankit Garg, Ashima Gambhir and Prachi Goel
4.1 Introduction 54
4.1.1 Elements of Internet of Things (IoT) 55
4.2 IoT Landscape: Current and Potential Applications 56
4.3 Advantages of Internet of Things (IoT) 59
4.4 Architecture of IoT Systems 60
4.5 IoT Security 63
4.6 Security Challenges in IoT Architecture 66
4.7 Security by Design in IoT 71
4.8 Best Practices to Secure IoT Devices 71
4.9 Security Attacks in IoT System 73
4.10 Various IoT Security Challenges 78
4.11 Limitations of Available Resources 79
4.12 Solutions to Preserve Privacy in IoT Systems 83
5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System
93
Gaurav Jolly and Rahul Johari
5.1 Introduction 93
5.2 Cyber Physical System: Definition 95
5.3 System Interfaces 96
5.4 Communication Channel 98
5.5 Physical Interaction 100
5.6 CPS vs IoT 102
5.7 Cyber Physical System Issues 104
5.8 Literature Survey 106
5.9 Applications of Cyber Physical System 108
5.10 Future of Cyber Physical Systems 115
5.11 Conclusion 116
6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF
Methodology 119
Sivasankari Narasimhan
6.1 Introduction 119
6.2 Related Works 121
6.3 Trust Calculation Basics 123
6.4 Deriving Trust Relationships 127
6.5 Trust Derivation Examples 128
6.6 Combination of Trust Relationship 130
6.7 Analysis of Attacks 131
6.8 Conclusions 132
7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data
Management 135
Prachi Goyal, Ankit Garg and Prakhar Jindal
7.1 Introduction 136
7.2 Literature Review 138
7.3 Overview of System Architecture 140
7.4 Experiments and Comparison 142
7.5 Database for Experiment 143
7.6 Assessment of the Index Structure 144
7.7 Performance Evaluation of Exact Search 147
7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search 148
7.9 Evaluation of Data Distribution 152
7.10 Conclusion 153
8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance
and Impact 159
Nabeela Hasan and Mansaf Alam
8.1 Introduction 160
8.2 An Efficient Approach Towards IIoT Technology 161
8.3 Evolution of IIoT 163
8.4 IIoT Architecture 165
8.5 Industrial Applications of IoT 172
8.6 Smart Manufacturing 172
8.7 Smart Healthcare 173
8.8 Smart Transportation 174
8.9 Smart Cities 174
8.10 Oil and Gas Industry 175
8.11 Logistics and Supply Chain 176
8.12 Basic Technologies of IIoT 177
8.13 Things Over Internet 178
8.14 Technology on Blockchain 178
8.15 Computing of Data Over Cloud Technology 178
8.16 Artificial Intelligence and Cyber Physical Systems 179
8.17 Analytics on Management of Big Data 179
8.18 Future Technologies: Augmented and Virtual Reality 180
8.19 Industry 4.0 180
8.20 Research Challenges 187
8.20.1 Energy Efficiency 187
8.20.2 Coexistence and Interoperability 187
8.20.3 Real-Time Performance 188
8.20.4 Security and Privacy 189
8.20.5 Fault Detection and Reconfiguration 189
8.20.6 User-Friendliness in Product Deployment and Usage 190
8.21 Conclusions 190
9 Evolving Trends of Artificial Intelligence and Robotics in Smart City
Applications: Crafting Humane Built Environment 195
Niva Rana Mahanta and Suvarna Lele
9.1 Fundamentals of Smart Cities 196
9.2 Case Study Analysis 209
9.3 Smart Buildings in Smart Cities: Humane Approach 225
9.4 Future Scope and Impact on Society 232
9.5 Conclusion 235
10 T-Secure IoT in Smart Home System 243
Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS
10.1 Introduction 244
10.2 Literature 245
10.3 Method 254
10.4 Chematic Implementation 260
10.5 Simulation and Result 260
10.6 Conclusion 260
11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport
267
Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan
11.1 Introduction 268
11.2 Intelligent Transport System 269
11.3 Technologies Used in Intelligent Transport Systems 270
11.4 Micro Mobility 272
11.5 Case Study 276
11.6 Methodology: Value -- Steam Mapping the Existing Operations 276
11.7 Operational Challenges Faced by Arnab Micro Mobility 281
11.8 Conclusion 287
12 Automatic Booking of LPG and Leakage Detection System Using IoT 291
Aishwarya Jain, Meghana H M and Annaiah H
12.1 "What is IoT?" 292
12.2 Why IoT Matters 292
12.2.1 Collecting and Sending Information 293
12.2.2 Receiving and Acting on Information 293
12.2.3 Doing Both: The Goal of an IoT System 294
12.3 The oneM2M IoT Standardized Architecture 294
12.4 The IoT World Forum (IoTWF) Standardized Architecture 296
12.5 A Simplified IoT Architecture 299
12.6 Case Study: Automatic LPG Booking and Leakage Detection System using
IoT 302
12.6.1 Problem Statement 302
12.6.2 Proposed Solution 303
12.6.3 Architecture of the System 304
12.6.4 System Setup 308
12.6.5 Working of System 308
12.7 Conclusion 310
References 310
Index 313