Читать книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов - Страница 2
Table of Contents
Оглавление1 Cover
4 Preface
6 1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1.1 Introduction 1.2 Growth of IoT 1.3 IoT Technologies 1.4 Application Areas of Internet of Things 1.5 IoT Security and Protection Concerns 1.6 IoT Security 1.7 Conclusion References
7 2 Blockchain in IoT and Limitations 2.1 Introduction 2.2 Literature Review 2.3 Limitations of Blockchain 2.4 Conclusion References
8 3 IoT Protocol Security Mechanisms 3.1 Introduction 3.2 Comparing to IoT Security and Cyber-Physical Structures 3.3 Potential IoT and the Need for Safety 3.4 Future-Cognitive Structures and IoT 3.5 Security Engineering for IoT Development 3.6 Building Security into Design and Development 3.7 Security in Agile Developments 3.8 Focusing on the IoT Device in Operation 3.9 IoT Security Innovation Cryptographic Basics 3.10 Cryptographic Primitive Forms and Implementations in the IoT 3.11 Encryption and Decryption 3.12 Hashes 3.13 Digital Signatures 3.14 Generation of Random Numbers 3.15 Cloud Security for IoT 3.16 Control of Assets/Inventories Conclusion References
9 4 IoT Security, Privacy, Challenges, and Solutions 4.1 Introduction 4.2 IoT Landscape: Current and Potential Applications 4.3 Advantages of Internet of Things (IoT) 4.4 Architecture of IoT Systems 4.5 IoT Security 4.6 Security Challenges in IoT Architecture 4.7 Security by Design in IoT 4.8 Best Practices to Secure IoT Devices 4.9 Security Attacks in IoT System 4.10 Various IoT Security Challenges 4.11 Limitations of Available Resources 4.12 Solutions to Preserve Privacy in IoT Systems Conclusions References
10 5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 5.1 Introduction 5.2 Cyber Physical System: Definition 5.3 System Interfaces 5.4 Communication Channel 5.5 Physical Interaction 5.6 CPS vs IoT 5.7 Cyber Physical System Issues 5.8 Literature Survey 5.9 Applications of Cyber Physical System 5.10 Future of Cyber Physical Systems 5.11 Conclusion References
11 6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 6.1 Introduction 6.2 Related Works 6.3 Trust Calculation Basics 6.4 Deriving Trust Relationships 6.5 Trust Derivation Examples 6.6 Combination of Trust Relationship 6.7 Analysis of Attacks 6.8 Conclusions References
12 7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 7.1 Introduction 7.2 Literature Review 7.3 Overview of System Architecture 7.4 Experiments and Comparison 7.5 Database for Experiment 7.6 Assessment of the Index Structure 7.7 Performance Evaluation of Exact Search 7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search 7.9 Evaluation of Data Distribution 7.10 Conclusion References
13 8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 8.1 Introduction 8.2 An Efficient Approach Towards IIoT Technology 8.3 Evolution of IIoT 8.4 IIoT Architecture 8.5 Industrial Applications of IoT 8.6 Smart Manufacturing 8.7 Smart Healthcare 8.8 Smart Transportation 8.9 Smart Cities 8.10 Oil and Gas Industry 8.11 Logistics and Supply Chain 8.12 Basic Technologies of IIoT 8.13 Things Over Internet 8.14 Technology on Blockchain 8.15 Computing of Data Over Cloud Technology 8.16 Artificial Intelligence and Cyber Physical Systems 8.17 Analytics on Management of Big Data 8.18 Future Technologies: Augmented and Virtual Reality 8.19 Industry 4.0 8.20 Research Challenges 8.21 Conclusions References
14 9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 9.1 Fundamentals of Smart Cities 9.2 Case Study Analysis 9.3 Smart Buildings in Smart Cities: Humane Approach 9.4 Future Scope and Impact on Society 9.5 Conclusion References
15 10 T-Secure IoT in Smart Home System 10.1 Introduction 10.2 Literature 10.3 Method 10.4 Chematic Implementation 10.5 Simulation and Result 10.6 Conclusion References
16 11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 11.1 Introduction 11.2 Intelligent Transport System 11.3 Technologies Used in Intelligent Transport Systems 11.4 Micro Mobility 11.5 Case Study 11.6 Methodology: Value – Steam Mapping the Existing Operations 11.7 Operational Challenges Faced by Arnab Micro Mobility 11.8 Conclusion References
17 12 Automatic Booking of LPG and Leakage Detection System Using IoT 12.1 “What is IoT?” 12.2 Why IoT Matters 12.3 The oneM2M IoT Standardized Architecture 12.4 The IoT World Forum (IoTWF) Standardized Architecture 12.5 A Simplified IoT Architecture 12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT 12.7 Conclusion References
18 Index