Читать книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов - Страница 11

Оглавление

Book Description

This book “Trust-Based Communication Systems for Internet of Things Applications” provides the conceptual and fundamental research related to secure and trust-based communication in IoT devices and applications. It also includes demonstrations on a wide range of interdisciplinary applications and innovative developments in the field of IoT such as IIoT, block-chain technology, etc. that address the latest findings and results regarding a wide variety of technological issues and developments to reform the scientific society.

The book contains 12 chapters. Chapter 1 titled “An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation” highlights the fundamental concepts of various IoT applications such as interoperability, smart cities, smart pharmacy, workplaces, home, transport, and vegetable traceability framework.

Chapter 2 titled “Blockchain in IoT and Limitations” presents the decentralized approach using blockchain technology to secure the IoT applications and highlight its limitations.

Chapter 3 titled “IoT Protocol Security Mechanisms” discusses several security aspects in IoT applications and discusses various cryptographic protocols which can be used in different IoT enabled applications to secure inter-communication.

Chapter 4 titled “IoT Security, Privacy, Challenges, and Solutions” presents a few highlights on IoT security, privacy, challenges, and solutions. The chapter begins with an introduction to IoT. and its architecture and later addresses various Internet of Things security challenges and best practices to safeguard.

Chapter 5 titled “CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System” expresses the similarities and differences between IoT and CPS and various applications of IOT and CPS to show as to how both are making the life of common men easy in every walk of life.

Chapter 6 titled “Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology” focuses the trust calculation in Physical Unclonable Function (PUF) based networks and finds the appropriate method in several facets of trust.

Chapter 7 titled “Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management” presents a comparative analysis of various indexing data structures used in cloud computing for data management. To evaluate the performance of the existing indexing structures, different experiments have been carried out.

Chapter 8 titled “Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact” provides a system of IIoT, structure and IIoT layers, and IIoT applications, as well as IoT openings and difficulties. It shares the importance and progress from the Industrial IoT to the Industries 4.0 process as well as move towards the industrial Internet.

Chapter 9 titled “Evolving Trends of Artificial Intelligence and Robotics in Smart City Application: Crafting Humane Built Environment” examined the smart city concept from evolving trends of implementation with AI and Robotics in different built environment layers from micro to macro level of spaces. Additionally, a few application-based case studies and the initiatives taken by global agencies (UNESCO) were analyzed for making these implications more human-centric.

Chapter 10 titled “T-Secure IoT in Smart Home System” provides an approach to consumer satisfaction in the service of the system by the usage of a two-level bio-based Internet of Things (IoT) delivery framework for smart home systems and an android-based program for the monitoring and control of electronic devices.

Chapter 11 titled “Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport” presents a technical case study on how geofencing technology is used to track and trace the city’s e-scooter, in case it is stolen. The geofencing technology provides alerts to the company on a real-time basis by using IoT. The study proposes a process framework to integrate the location-tracking and monitoring system based on GPS and geofencing capabilities.

Chapter 12 titled “Automatic Booking of LPG and Leakage Detection System Using IoT” presents an IoT based cost-effective gas leakage detection system that helps the common people in their household activities.

This book primarily covers all aspects of research and development in secured communication in IoT devices starting from the fundamentals of IoT devices and ending with the decentralized and blockchain based IoT systems and IIoT applications. We feel that after reading this book, the reader will have a thorough, well rounded understanding of machine learning and data science fundamentals.

Dr. Prateek Agrawal Dr. Vishu MadaanDr. Anand Sharma Dr. Dilip SharmaMr. Akshat AgarwalDr. Sandeep Kautish

Trust-Based Communication Systems for Internet of Things Applications

Подняться наверх