Security Issues and Privacy Concerns in Industry 4.0 Applications

Security Issues and Privacy Concerns in Industry 4.0 Applications
Автор книги: id книги: 2128336     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 19609,3 руб.     (213,66$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119776505 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

The scope of Security Issues, Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trend and the need for technological change in Industry 4.0. Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT based health care management system, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of the dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed. Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Оглавление

Группа авторов. Security Issues and Privacy Concerns in Industry 4.0 Applications

Table of Contents

Guide

List of Illustrations

List of Tables

Pages

Security Issues and Privacy Concerns in Industry 4.0 Applications

Preface

1. Industry 4.0: Smart Water Management System Using IoT

1.1 Introduction

1.1.1 Industry 4.0

1.1.2 IoT

1.1.3 Smart City

1.1.4 Smart Water Management

1.2 Preliminaries

1.2.1 Internet World to Intelligent World

1.2.2 Architecture of IoT System

1.2.3 Architecture of Smart City

1.3 Literature Review on SWMS

1.3.1 Water Quality Parameters Related to SWMS

1.3.2 SWMS in Agriculture

1.3.3 SWMS Using Smart Grids

1.3.4 Machine Learning Models in SWMS

1.3.5 IoT-Based SWMS

1.4 Conclusion

References

2. Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues

2.1 Introduction

2.1.1 Network Forensics

2.1.2 The Fourth Industrial Revolution

2.1.2.1 Machine-to-Machine (M2M) Communication

2.1.3 Cloud Computing

2.1.3.1 Infrastructure-as-a-Service (IaaS)

2.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution

2.2 Generic Model Architecture

2.3 Model Implementation

2.3.1 OpenNebula (Hypervisor) Implementation Platform

2.3.2 NetworkMiner Analysis Tool

2.3.3 Performance Matrix Evaluation & Result Discussion

2.4 Cloud Security Impact on M2M Communication

2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0)

2.5 Conclusion

References

3. Regional Language Recognition System for Industry 4.0

3.1 Introduction

3.2 Automatic Speech Recognition System

3.2.1 Preprocessing

3.2.2 Feature Extraction

3.2.2.1 Linear Predictive Coding (LPC)

3.2.2.2 Linear Predictive Cepstral Coefficient (LPCC)

3.2.2.3 Perceptual Linear Predictive (PLP)

3.2.2.4 Power Spectral Analysis

3.2.2.5 Mel Frequency Cepstral Coefficients

3.2.2.6 Wavelet Transform

3.2.3 Implementation of Deep Learning Technique

3.2.3.1 Recurrent Neural Network

3.2.3.2 Long Short-Term Memory Network

3.2.3.3 Hidden Markov Models (HMM)

3.2.3.4 Hidden Markov Models - Long Short-Term Memory Network (HMM-LSTM)

3.2.3.5 Evaluation Metrics

3.3 Literature Survey on Existing TSRS

3.4 Conclusion

References

4. Approximation Algorithm and Linear Congruence: An Approach for Optimizing the Security of IoT-Based Healthcare Management System

4.1 Introduction

4.1.1 IoT in Medical Devices

4.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System

4.1.3 Cryptography and Secret Keys

4.1.4 RSA

4.1.5 Approximation Algorithm and Subset Sum Problem

4.1.6 Significance of Use of Subset Sum Problem in Our Scheme

4.1.7 Linear Congruence

4.1.8 Linear and Non-Linear Functions

4.1.9 Pell’s Equation

4.2 Literature Survey

4.3 Problem Domain

4.4 Solution Domain and Objectives

4.5 Proposed Work. 4.5.1 Methodology

4.5.2 Session Key Generation

4.5.3 Intermediate Key Generation

4.5.4 Encryption Process

4.5.5 Generation of Authentication Code and Transmission File

4.5.6 Decryption Phase

4.6 Results and Discussion

4.6.1 Statistical Analysis

4.6.2 Randomness Analysis of Key

4.6.3 Key Sensitivity Analysis

4.6.4 Security Analysis. 4.6.4.1 Key Space Analysis

4.6.4.2 Brute-Force Attack

4.6.4.3 Dictionary Attack

4.6.4.4 Impersonation Attack

4.6.4.5 Replay Attack

4.6.4.6 Tampering Attack

4.6.5 Comparative Analysis

4.6.5.1 Comparative Analysis Related to IoT Attacks

4.6.6 Significance of Authentication in Our Proposed Scheme

4.7 Conclusion

References

5. A Hybrid Method for Fake Profile Detection in Social Network Using Artificial Intelligence

5.1 Introduction

5.2 Literature Survey

5.3 Methodology

5.3.1 Datasets

5.3.2 Detection of Fake Account

5.3.3 Suggested Framework

5.3.3.1 Pre-Processing

5.3.3.1.1 Tokenization

5.3.3.1.2 Stop Word Removal

5.3.3.1.3 Stemming and Lemmatization

5.3.3.2 Principal Component Analysis (PCA)

5.3.3.3 Learning Algorithms

5.3.3.4 Feature or Attribute Selection

5.4 Result Analysis

5.4.1 Cross-Validation

5.4.2 Analysis of Metrics

5.4.3 Performance Evaluation of Proposed Model

5.4.4 Performance Analysis of Classifiers

5.5 Conclusion

References

6. Packet Drop Detection in Agricultural-Based Internet of Things Platform

6.1 Introduction

6.2 Problem Statement and Related Work

6.3 Implementation of Packet Dropping Detection in IoT Platform

6.4 Performance Analysis

6.5 Conclusion

References

7. Smart Drone with Open CV to Clean the Railway Track

7.1 Introduction

7.2 Related Work

7.3 Problem Definition

7.4 The Proposed System. 7.4.1 Drones with Human Intervention

7.4.2 Drones without Human Intervention

7.4.3 Working Model

7.5 Experimental Results

7.6 Conclusion

References

8. Blockchain and Big Data: Supportive Aid for Daily Life

8.1 Introduction

8.1.1 Steps of Blockchain Technology Works

8.1.2 Blockchain Private

8.1.3 Blockchain Security

8.2 Blockchain vs. Bitcoin

8.2.1 Blockchain Applications

8.2.2 Next Level of Blockchain

8.2.3 Blockchain Architecture’s Basic Components

8.2.4 Blockchain Architecture

8.2.5 Blockchain Characteristics

8.3 Blockchain Components

8.3.1 Cryptography

8.3.2 Distributed Ledger

8.3.3 Smart Contracts

8.3.4 Consensus Mechanism

8.3.4.1 Proof of Work (PoW)

8.3.4.2 Proof of Stake (PoS)

8.4 Categories of Blockchain

8.4.1 Public Blockchain

8.4.2 Private Blockchain

8.4.3 Consortium Blockchain

8.4.4 Hybrid Blockchain

8.5 Blockchain Applications

8.5.1 Financial Application. 8.5.1.1 Bitcoin

8.5.1.2 Ripple

8.5.2 Non-Financial Applications. 8.5.2.1 Ethereum

8.5.2.2 Hyperledger

8.6 Blockchain in Different Sectors

8.7 Blockchain Implementation Challenges

8.8 Revolutionized Challenges in Industries

8.9 Conclusion

References

9. A Novel Framework to Detect Effective Prediction Using Machine Learning

9.1 Introduction

9.2 ML-Based Prediction

9.3 Prediction in Agriculture

9.4 Prediction in Healthcare

9.5 Prediction in Economics

9.6 Prediction in Mammals

9.7 Prediction in Weather

9.8 Discussion

9.9 Proposed Framework

9.9.1 Problem Analysis

9.9.2 Preprocessing

9.9.3 Algorithm Selection

9.9.4 Training the Machine

9.9.5 Model Evaluation and Prediction

9.9.6 Expert Suggestion

9.9.7 Parameter Tuning

9.10 Implementation

9.10.1 Farmers and Sellers

9.10.2 Products

9.10.3 Price Prediction

9.11 Conclusion

References

10. Dog Breed Classification Using CNN

10.1 Introduction

10.2 Related Work

10.3 Methodology

10.4 Results and Discussions. 10.4.1 Training

10.4.2 Testing

10.5 Conclusions

References

11. Methodology for Load Balancing in Multi-Agent System Using SPE Approach

11.1 Introduction

11.2 Methodology for Load Balancing

11.3 Results and Discussion. 11.3.1 Proposed Algorithm in JADE Tool

11.3.1.1 Sensitivity Analysis

11.3.2 Proposed Algorithm in NetLogo

11.4 Algorithms Used

11.5 Results and Discussion

11.6 Summary

References

12. The Impact of Cyber Culture on New Media Consumers

12.1 Introduction

12.2 The Rise of the Term of Cyber Culture

12.2.1 Cyber Culture in the 21st Century

12.2.1.1 Socio-Economic Results of Cyber Culture

12.2.1.2 Psychological Outcomes of Cyber Culture

12.2.1.3 Political Outcomes of Cyber Culture

12.3 The Birth and Outcome of New Media Applications

12.3.1 New Media Environments

12.3.1.1 Social Sharing Networks

12.3.1.2 Network Logs (Blog, Weblog)

12.3.1.3 Computer Games

12.3.1.4 Digital News Sites and Mobile Media

12.3.1.5 Multimedia Media

12.3.1.6 What Affects the New Media Consumers’ Tendencies?

12.3.1.6.1 Formations Determining New Consumer Trends

12.4 Result

References

About the Editors

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106

.....

4. A. Varghese and D. Tandur. Wireless requirements and challenges in industry 4.0. In 2014 International Conferenceon Contemporary Computing and Informatics (IC3I), pages 634-638, 2014.

5. Tim Stock and G Seliger. Opportunities of sustainable manufacturing in industry 4.0. Procedia Cirp, 40:536-541, 2016.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Security Issues and Privacy Concerns in Industry 4.0 Applications
Подняться наверх