Details

Trust-Based Communication Systems for Internet of Things Applications


Trust-Based Communication Systems for Internet of Things Applications


1. Aufl.

von: Prateek Agrawal, Vishu Madaan, Anand Sharma, Dilip Kumar Sharma, Akshat Agrawal, Sandeep Kautish

173,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 17.06.2022
ISBN/EAN: 9781119896722
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS</b></p> <p><b>Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.</b></p> <p>The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.</p>
<p>Preface xiii</p> <p>Book Description xv</p> <p><b>1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1</b><br /><i>Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh</i></p> <p>1.1 Introduction 1</p> <p>1.2 Growth of IoT 2</p> <p>1.3 IoT Technologies 3</p> <p>1.4 Application Areas of Internet of Things 4</p> <p>1.5 IoT Security and Protection Concerns 11</p> <p>1.6 IoT Security 12</p> <p>1.7 Conclusion 12</p> <p><b>2 Blockchain in IoT and Limitations 17</b><br /><i>Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal</i></p> <p>2.1 Introduction 18</p> <p>2.2 Literature Review 22</p> <p>2.3 Limitations of Blockchain 23</p> <p>2.4 Conclusion 24</p> <p><b>3 IoT Protocol Security Mechanisms 29</b><br /><i>D. Karthika and Dr. K. Kalaiselvi</i></p> <p>3.1 Introduction 30</p> <p>3.2 Comparing to IoT Security and Cyber-Physical Structures 31</p> <p>3.3 Potential IoT and the Need for Safety 32</p> <p>3.4 Future-Cognitive Structures and IoT 32</p> <p>3.5 Security Engineering for IoT Development 33</p> <p>3.6 Building Security into Design and Development 34</p> <p>3.7 Security in Agile Developments 35</p> <p>3.8 Focusing on the IoT Device in Operation 36</p> <p>3.9 IoT Security Innovation Cryptographic Basics 37</p> <p>3.10 Cryptographic Primitive Forms and Implementations in the IoT 37</p> <p>3.11 Encryption and Decryption 38</p> <p>3.12 Hashes 41</p> <p>3.13 Digital Signatures 42</p> <p>3.14 Generation of Random Numbers 43</p> <p>3.15 Cloud Security for IoT 44</p> <p>3.16 Control of Assets/Inventories 45</p> <p><b>4 IoT Security, Privacy, Challenges, and Solutions 53</b><br /><i>Ankit Garg, Ashima Gambhir and Prachi Goel</i></p> <p>4.1 Introduction 54</p> <p>4.1.1 Elements of Internet of Things (IoT) 55</p> <p>4.2 IoT Landscape: Current and Potential Applications 56</p> <p>4.3 Advantages of Internet of Things (IoT) 59</p> <p>4.4 Architecture of IoT Systems 60</p> <p>4.5 IoT Security 63</p> <p>4.6 Security Challenges in IoT Architecture 66</p> <p>4.7 Security by Design in IoT 71</p> <p>4.8 Best Practices to Secure IoT Devices 71</p> <p>4.9 Security Attacks in IoT System 73</p> <p>4.10 Various IoT Security Challenges 78</p> <p>4.11 Limitations of Available Resources 79</p> <p>4.12 Solutions to Preserve Privacy in IoT Systems 83</p> <p><b>5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 93</b><br /><i>Gaurav Jolly and Rahul Johari</i></p> <p>5.1 Introduction 93</p> <p>5.2 Cyber Physical System: Definition 95</p> <p>5.3 System Interfaces 96</p> <p>5.4 Communication Channel 98</p> <p>5.5 Physical Interaction 100</p> <p>5.6 CPS vs IoT 102</p> <p>5.7 Cyber Physical System Issues 104</p> <p>5.8 Literature Survey 106</p> <p>5.9 Applications of Cyber Physical System 108</p> <p>5.10 Future of Cyber Physical Systems 115</p> <p>5.11 Conclusion 116</p> <p><b>6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 119</b><br /><i>Sivasankari Narasimhan</i></p> <p>6.1 Introduction 119</p> <p>6.2 Related Works 121</p> <p>6.3 Trust Calculation Basics 123</p> <p>6.4 Deriving Trust Relationships 127</p> <p>6.5 Trust Derivation Examples 128</p> <p>6.6 Combination of Trust Relationship 130</p> <p>6.7 Analysis of Attacks 131</p> <p>6.8 Conclusions 132</p> <p><b>7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 135</b><br /><i>Prachi Goyal, Ankit Garg and Prakhar Jindal</i></p> <p>7.1 Introduction 136</p> <p>7.2 Literature Review 138</p> <p>7.3 Overview of System Architecture 140</p> <p>7.4 Experiments and Comparison 142</p> <p>7.5 Database for Experiment 143</p> <p>7.6 Assessment of the Index Structure 144</p> <p>7.7 Performance Evaluation of Exact Search 147</p> <p>7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search 148</p> <p>7.9 Evaluation of Data Distribution 152</p> <p>7.10 Conclusion 153</p> <p><b>8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 159</b><br /><i>Nabeela Hasan and Mansaf Alam</i></p> <p>8.1 Introduction 160</p> <p>8.2 An Efficient Approach Towards IIoT Technology 161</p> <p>8.3 Evolution of IIoT 163</p> <p>8.4 IIoT Architecture 165</p> <p>8.5 Industrial Applications of IoT 172</p> <p>8.6 Smart Manufacturing 172</p> <p>8.7 Smart Healthcare 173</p> <p>8.8 Smart Transportation 174</p> <p>8.9 Smart Cities 174</p> <p>8.10 Oil and Gas Industry 175</p> <p>8.11 Logistics and Supply Chain 176</p> <p>8.12 Basic Technologies of IIoT 177</p> <p>8.13 Things Over Internet 178</p> <p>8.14 Technology on Blockchain 178</p> <p>8.15 Computing of Data Over Cloud Technology 178</p> <p>8.16 Artificial Intelligence and Cyber Physical Systems 179</p> <p>8.17 Analytics on Management of Big Data 179</p> <p>8.18 Future Technologies: Augmented and Virtual Reality 180</p> <p>8.19 Industry 4.0 180</p> <p>8.20 Research Challenges 187</p> <p>8.20.1 Energy Efficiency 187</p> <p>8.20.2 Coexistence and Interoperability 187</p> <p>8.20.3 Real-Time Performance 188</p> <p>8.20.4 Security and Privacy 189</p> <p>8.20.5 Fault Detection and Reconfiguration 189</p> <p>8.20.6 User-Friendliness in Product Deployment and Usage 190</p> <p>8.21 Conclusions 190</p> <p><b>9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 195</b><br /><i>Niva Rana Mahanta and Suvarna Lele</i></p> <p>9.1 Fundamentals of Smart Cities 196</p> <p>9.2 Case Study Analysis 209</p> <p>9.3 Smart Buildings in Smart Cities: Humane Approach 225</p> <p>9.4 Future Scope and Impact on Society 232</p> <p>9.5 Conclusion 235</p> <p><b>10 T-Secure IoT in Smart Home System 243</b><br /><i>Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS</i></p> <p>10.1 Introduction 244</p> <p>10.2 Literature 245</p> <p>10.3 Method 254</p> <p>10.4 Chematic Implementation 260</p> <p>10.5 Simulation and Result 260</p> <p>10.6 Conclusion 260</p> <p><b>11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 267</b><br /><i>Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan</i></p> <p>11.1 Introduction 268</p> <p>11.2 Intelligent Transport System 269</p> <p>11.3 Technologies Used in Intelligent Transport Systems 270</p> <p>11.4 Micro Mobility 272</p> <p>11.5 Case Study 276</p> <p>11.6 Methodology: Value -- Steam Mapping the Existing Operations 276</p> <p>11.7 Operational Challenges Faced by Arnab Micro Mobility 281</p> <p>11.8 Conclusion 287</p> <p><b>12 Automatic Booking of LPG and Leakage Detection System Using IoT 291</b><br /><i>Aishwarya Jain, Meghana H M and Annaiah H</i></p> <p>12.1 "What is IoT?" 292</p> <p>12.2 Why IoT Matters 292</p> <p>12.2.1 Collecting and Sending Information 293</p> <p>12.2.2 Receiving and Acting on Information 293</p> <p>12.2.3 Doing Both: The Goal of an IoT System 294</p> <p>12.3 The oneM2M IoT Standardized Architecture 294</p> <p>12.4 The IoT World Forum (IoTWF) Standardized Architecture 296</p> <p>12.5 A Simplified IoT Architecture 299</p> <p>12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT 302</p> <p>12.6.1 Problem Statement 302</p> <p>12.6.2 Proposed Solution 303</p> <p>12.6.3 Architecture of the System 304</p> <p>12.6.4 System Setup 308</p> <p>12.6.5 Working of System 308</p> <p>12.7 Conclusion 310</p> <p>References 310</p> <p>Index 313</p>
<p><b>Prateek Agrawal, PhD, </b>is a post-doctoral researcher at the department of ITEC, University of Klagenfurt, Austria and an associate professor in the School of Computer Science Engineering, Lovely Professional University, India. With over 10 years of research and teaching experience, he received his PhD from IKG-Punjab Technical University, India. He has authored more than 50 research papers in scholarly journals and conferences and is a reviewer and editorial member of numerous journals. He also served as technical program committee member of many technical conferences.</p> <p><b>Vishu Madaan, MTech,</b> is an assistant professor with Lovely Professional University and is pursuing her PhD in computer science at IKG-Punjab Technical University, Punjab. She has more than six years of teaching and research experience and has authored more than 30 research articles in peer-reviewed conferences and journals. She is also a reviewer for many international conferences and scholarly journals. <p><b>Anand Sharma, PhD, </b>received his PhD in engineering from MUST, Lakshmangarh. He has been working with Mody University of Science and Technology, Lakshmangarh for the last 10 years and has more than 14 years of experience of teaching and research. He has organized more than 15 conferences, seminars, and workshops and has chaired more than eight special sessions and delivered six keynote addresses in international conferences. He is an editorial member for several international journals on the organizing committees for several scientific conferences. <p><b>Dilip Kumar Sharma, PhD,</b> is a professor and associate dean in the Department of Computer Engineering and Applications, GLA University, Mathura, U.P, India and is working on several research projects funded by government agencies. He has co-edited three books, delivered or chaired more than 70 guest lectures and has been guest editor on several scientific journals. He has organized more than 12 scholarly conferences and workshops and has published more than 100 research papers in scientific journals. He also has several scholarly awards to his credit. <p><b>Akshat Agrawal, BTech,</b> is an assistant professor at the Amity School of Engineering and Technology, Amity University Haryana. He has a total of 10 years of teaching and research experience and has published 29 research papers in reputed refereed international journals. He has been a visiting faculty member at Technical University Kosice, Slovakia and is a reviewer for research papers and book chapters for several scholarly and scientific conferences. <p><b>Sandeep Kautish, PhD, </b>is a professor and dean at the LBEF Campus, Kathmandu Nepal, in academic collaboration with Asia Pacific University of Technology and Innovation, Malaysia. He is a seasoned academician and professor with over 16 years of work experience including over five years in academic administration in various institutions of India and abroad. He holds a PG diploma in management, and he has over 40 publications in scientific journals. He has authored or edited more than seven books with various publishers, including Scrivener Publishing, and he has one patent to his credit. He serves on the editorial boards of several scientific and technical journals and is a series editor for a book series with another publisher.
<p><b>Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.</b></p> <p>The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.

Diese Produkte könnten Sie auch interessieren:

From Photon to Pixel
From Photon to Pixel
von: Henri Maître
PDF ebook
139,99 €
Computer Vision in Vehicle Technology
Computer Vision in Vehicle Technology
von: Antonio M. López, Atsushi Imiya, Tomas Pajdla, Jose M. Álvarez
PDF ebook
81,99 €
Foundations of Electromagnetic Compatibility
Foundations of Electromagnetic Compatibility
von: Bogdan Adamczyk
PDF ebook
117,99 €