Trust-Based Communication Systems for Internet of Things Applications

Trust-Based Communication Systems for Internet of Things Applications
Автор книги: id книги: 2388407     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 23210,7 руб.     (246,68$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Отраслевые издания Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119896722 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.

Оглавление

Группа авторов. Trust-Based Communication Systems for Internet of Things Applications

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Trust-Based Communication Systems for Internet of Things Applications

Preface

Book Description

1. An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation

1.1 Introduction

1.2 Growth of IoT

1.3 IoT Technologies

1.4 Application Areas of Internet of Things

1.5 IoT Security and Protection Concerns

1.6 IoT Security

1.7 Conclusion

References

2. Blockchain in IoT and Limitations

2.1 Introduction

2.2 Literature Review

2.3 Limitations of Blockchain

2.4 Conclusion

References

3. IoT Protocol Security Mechanisms

3.1 Introduction

3.2 Comparing to IoT Security and Cyber-Physical Structures

3.3 Potential IoT and the Need for Safety

3.4 Future-Cognitive Structures and IoT

3.5 Security Engineering for IoT Development

3.6 Building Security into Design and Development

3.7 Security in Agile Developments

3.8 Focusing on the IoT Device in Operation

3.9 IoT Security Innovation Cryptographic Basics

3.10 Cryptographic Primitive Forms and Implementations in the IoT

3.11 Encryption and Decryption

3.12 Hashes

3.13 Digital Signatures

3.14 Generation of Random Numbers

3.15 Cloud Security for IoT

3.16 Control of Assets/Inventories

3.16.1 Service Provisioning, Billing, and Entitlement Management

3.16.2 Real-Time Monitoring

3.16.3 Sensor Coordination

3.16.4 Customer Intelligence and Marketing

3.16.5 Information Sharing

3.16.6 Message Transport/Broadcast

Conclusion

References

4. IoT Security, Privacy, Challenges, and Solutions

4.1 Introduction

4.1.1 Elements of Internet of Things (IoT)

4.2 IoT Landscape: Current and Potential Applications

4.3 Advantages of Internet of Things (IoT)

4.4 Architecture of IoT Systems

4.4.1 Five Layered Architecture

4.4.2 Fog Based IoT Architecture

4.5 IoT Security

4.5.1 Security Requirements in IoT Systems

4.6 Security Challenges in IoT Architecture

4.6.1 Security Challenges and Requirements at Perception Layer

4.6.2 Security Issues and Requirements at Network Layer

4.6.3 Security Issues and Requirements at Application Layer

4.7 Security by Design in IoT

4.8 Best Practices to Secure IoT Devices

4.9 Security Attacks in IoT System

4.9.1 Physical Attacks

4.9.2 Software Attacks

4.9.3 Network Attacks

4.9.4 Encryption Attacks

4.10 Various IoT Security Challenges

4.11 Limitations of Available Resources

4.11.1 Big Data

4.11.2 Authorization and Access Control

4.11.3 Secure Communication

4.11.4 System Flexibility

4.11.5 Complex System

4.11.6 IoT Privacy

4.11.7 Threats in IoT Privacy

4.11.8 Detection

4.11.9 Localization and Tracking

4.11.10 Profiling

4.11.11 Life-Cycle Transitions

4.11.12 Inventory Attack

4.11.13 Linkage

4.12 Solutions to Preserve Privacy in IoT Systems

Conclusions

References

5. CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System

5.1 Introduction

5.2 Cyber Physical System: Definition

5.3 System Interfaces

5.4 Communication Channel

5.5 Physical Interaction

5.6 CPS vs IoT

5.7 Cyber Physical System Issues

5.8 Literature Survey

5.9 Applications of Cyber Physical System

5.10 Future of Cyber Physical Systems

5.11 Conclusion

References

6. Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology

6.1 Introduction

6.1.1 Essential Security Things to be Satisfied in Each IoT Node

6.1.2 Fault Categories of PUF Node Malfunctioning

6.2 Related Works

6.3 Trust Calculation Basics

6.3.1 Trust Classification

6.3.2 Direct Trust and Indirect Trust

6.4 Deriving Trust Relationships

6.5 Trust Derivation Examples

6.6 Combination of Trust Relationship

6.7 Analysis of Attacks

6.8 Conclusions

References

7. Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management

7.1 Introduction

7.2 Literature Review

7.3 Overview of System Architecture

7.4 Experiments and Comparison

7.5 Database for Experiment

7.6 Assessment of the Index Structure

7.7 Performance Evaluation of Exact Search

7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search

7.9 Evaluation of Data Distribution

7.10 Conclusion

References

8. Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact

8.1 Introduction

8.2 An Efficient Approach Towards IIoT Technology

8.3 Evolution of IIoT

8.4 IIoT Architecture

8.5 Industrial Applications of IoT

8.6 Smart Manufacturing

8.7 Smart Healthcare

8.8 Smart Transportation

8.9 Smart Cities

8.10 Oil and Gas Industry

8.11 Logistics and Supply Chain

8.12 Basic Technologies of IIoT

8.13 Things Over Internet

8.14 Technology on Blockchain

8.15 Computing of Data Over Cloud Technology

8.16 Artificial Intelligence and Cyber Physical Systems

8.17 Analytics on Management of Big Data

8.18 Future Technologies: Augmented and Virtual Reality

8.19 Industry 4.0

8.19.1 Design Principles

8.19.2 Virtualizations

8.19.3 Interoperability

8.19.4 Real-Time Capability

8.19.5 Decentralization

8.19.6 Modularity

8.19.7 Service Orientation

8.19.8 Future of IIoT

8.20 Research Challenges

8.20.1 Energy Efficiency

8.20.2 Coexistence and Interoperability

8.20.3 Real-Time Performance

8.20.4 Security and Privacy

8.20.5 Fault Detection and Reconfiguration

8.20.6 User-Friendliness in Product Deployment and Usage

8.21 Conclusions

References

9. Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment

9.1 Fundamentals of Smart Cities

9.1.1 Introduction and Literature Study

9.1.2 Smart and Human-Centric Livable Cities

9.1.3 Smart Cities and Sustainable Environment

9.1.4 Implementation Strategies for City Planning and Urban Design Parameters

9.1.5 Remote Monitoring and Management (RMM) in Upcoming City Development

9.2 Case Study Analysis. 9.2.1 Dubai, United Arab Emirates

9.2.2 Seoul, South Korea

9.2.3 Barcelona, Spain

9.2.4 Singapore

9.3 Smart Buildings in Smart Cities: Humane Approach

9.3.1 Smart Interiors

9.3.2 Technological Interventions

9.3.3 Building Automation

9.3.4 Benefits and Challenges

9.4 Future Scope and Impact on Society

9.5 Conclusion

References

10. T-Secure IoT in Smart Home System

10.1 Introduction

10.2 Literature. 10.2.1 Smart Home Description

10.2.2 Smart Homes and Technology from Past to Present

10.2.3 Smart Home Automation

10.2.4 Automation Systems

10.2.5 Lighting Systems

10.2.6 Current Smart Building Systems’ Interactive Personalizability

10.2.7 Block Diagram (Figure 10.1)

10.3 Method. 10.3.1 Hardware Implementation

10.3.2 Software Iplementation

10.4 Chematic Implementation

10.5 Simulation and Result

10.6 Conclusion

References

11. Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport

11.1 Introduction

11.2 Intelligent Transport System

11.3 Technologies Used in Intelligent Transport Systems

11.4 Micro Mobility

11.5 Case Study

11.6 Methodology: Value – Steam Mapping the Existing Operations

11.7 Operational Challenges Faced by Arnab Micro Mobility

11.8 Conclusion

References

12. Automatic Booking of LPG and Leakage Detection System Using IoT

12.1 “What is IoT?”

12.2 Why IoT Matters

12.2.1 Collecting and Sending Information

12.2.2 Receiving and Acting on Information

12.2.3 Doing Both: The Goal of an IoT System

12.3 The oneM2M IoT Standardized Architecture

12.4 The IoT World Forum (IoTWF) Standardized Architecture

12.5 A Simplified IoT Architecture

12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT

12.6.1 Problem Statement

12.6.2 Proposed Solution

12.6.3 Architecture of the System

12.6.4 System Setup

12.6.5 Working of System

12.7 Conclusion

References

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106

.....

34. S. Rajguru, S. Kinhekar, and S. Pati, “Analysis of internet of things in a smart environment,” International Journal of Enhanced Research in Management and Computer Applications, vol. 4, no. 4, pp. 40–43, 2015.

35. H. U. Rehman, M. Asif, and M. Ahmad, “Future applications and research challenges of IOT,” in 2017 International Conference on Information and Communication Technologies (ICICT), pp. 68–74, Dec 2017.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Trust-Based Communication Systems for Internet of Things Applications
Подняться наверх