MARC状态:审校 文献类型:西文图书 浏览次数:27
- 题名/责任者:
- Trust-based communication systems for internet of things applications / edited by Prateek Agrawal, Vishu Madaan, Anand Sharma, Dilip Sharma, Akshat Agarwal, and Sandeep Kautish.
- 出版发行项:
- Hoboken, NJ : Wiley ; Beverly, MA : Scrivener, 2022.
- ISBN:
- 9781119896333 :
- 其它标准号:
- 10.1002/9781119896746
- 载体形态项:
- xvii, 315 pages, illustrations ; 24 cm.
- 附加个人名称:
- Madaan, Vishu, editor.
- 附加个人名称:
- Agrawal, Prateek, editor.
- 附加个人名称:
- Sharma, Anand, editor.
- 附加个人名称:
- Sharma, Dilip, editor.
- 附加个人名称:
- Agrawal, Akshat, editor.
- 附加个人名称:
- Kautish, Sandeep, editor.
- 论题主题:
- Internet of things.
- 论题主题:
- Computer security.
- 中图法分类号:
- TP393.4
- 书目附注:
- Includes bibliographical references and index.
- 内容附注:
- Preface -- Book Description -- 1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1 Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh -- 1.1 Introduction -- 1.2 Growth of IoT -- 1.3 IoT Technologies -- 1.4 Application Areas of Internet of Things -- 1.5 IoT Security and Protection Concerns -- 1.6 IoT Security -- 1.7 Conclusion -- 2 Blockchain in IoT and Limitations 17 Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Limitations of Blockchain -- 2.4 Conclusion -- 3 IoT Protocol Security Mechanisms 29 D. Karthika and Dr. K. Kalaiselvi -- 3.1 Introduction -- 3.2 Comparing to IoT Security and Cyber-Physical Structures -- 3.3 Potential IoT and the Need for Safety -- 3.4 Future-Cognitive Structures and IoT -- 3.5 Security Engineering for IoT Development -- 3.6 Building Security into Design and Development -- 3.7 Security in Agile Developments -- 3.8 Focusing on the IoT Device in Operation -- 3.9 IoT Security Innovation Cryptographic Basics -- 3.10 Cryptographic Primitive Forms and Implementations in the IoT -- 3.11 Encryption and Decryption -- 3.12 Hashes -- 3.13 Digital Signatures -- 3.14 Generation of Random Numbers -- 3.15 Cloud Security for IoT -- 3.16 Control of Assets/Inventories -- 4 IoT Security, Privacy, Challenges, and Solutions 53 Ankit Garg, Ashima Gambhir and Prachi Goel -- 4.1 Introduction -- 4.1.1 Elements of Internet of Things (IoT) -- 4.2 IoT Landscape: Current and Potential Applications -- 4.3 Advantages of Internet of Things (IoT) -- 4.4 Architecture of IoT Systems -- 4.5 IoT Security -- 4.6 Security Challenges in IoT Architecture -- 4.7 Security by Design in IoT -- 4.8 Best Practices to Secure IoT Devices -- 4.9 Security Attacks in IoT System -- 4.10 Various IoT Security Challenges -- 4.11 Limitations of Available Resources -- 4.12 Solutions to Preserve Privacy in IoT Systems -- 5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 93 Gaurav Jolly and Rahul Johari -- 5.1 Introduction -- 5.2 Cyber Physical System: Definition -- 5.3 System Interfaces -- 5.4 Communication Channel -- 5.5 Physical Interaction -- 5.6 CPS vs IoT -- 5.7 Cyber Physical System Issues -- 5.8 Literature Survey -- 5.9 Applications of Cyber Physical System -- 5.10 Future of Cyber Physical Systems -- 5.11 Conclusion -- 6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 119 Sivasankari Narasimhan -- 6.1 Introduction -- 6.2 Related Works -- 6.3 Trust Calculation Basics -- 6.4 Deriving Trust Relationships -- 6.5 Trust Derivation Examples -- 6.6 Combination of Trust Relationship -- 6.7 Analysis of Attacks -- 6.8 Conclusions -- 7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 135 Prachi Goyal, Ankit Garg and Prakhar Jindal -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Overview of System Architecture -- 7.4 Experiments and Comparison -- 7.5 Database for Experiment -- 7.6 Assessment of the Index Structure -- 7.7 Performance Evaluation of Exact Search -- 7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search -- 7.9 Evaluation of Data Distribution -- 7.10 Conclusion -- 8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 159 Nabeela Hasan and Mansaf Alam -- 8.1 Introduction -- 8.2 An Efficient Approach Towards IIoT Technology -- 8.3 Evolution of IIoT -- 8.4 IIoT Architecture -- 8.5 Industrial Applications of IoT -- 8.6 Smart Manufacturing -- 8.7 Smart Healthcare -- 8.8 Smart Transportation -- 8.9 Smart Cities -- 8.10 Oil and Gas Industry -- 8.11 Logistics and Supply Chain -- 8.12 Basic Technologies of IIoT -- 8.13 Things Over Internet -- 8.14 Technology on Blockchain -- 8.15 Computing of Data Over Cloud Technology -- 8.16 Artificial Intelligence and Cyber Physical Systems -- 8.17 Analytics on Management of Big Data -- 8.18 Future Technologies: Augmented and Virtual Reality -- 8.19 Industry 4.0 -- 8.20 Research Challenges -- 8.20.1 Energy Efficiency -- 8.20.2 Coexistence and Interoperability -- 8.20.3 Real-Time Performance -- 8.20.4 Security and Privacy -- 8.20.5 Fault Detection and Reconfiguration -- 8.20.6 User-Friendliness in Product Deployment and Usage -- 8.21 Conclusions -- 9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 195 Niva Rana Mahanta and Suvarna Lele -- 9.1 Fundamentals of Smart Cities -- 9.2 Case Study Analysis -- 9.3 Smart Buildings in Smart Cities: Humane Approach -- 9.4 Future Scope and Impact on Society -- 9.5 Conclusion -- 10 T-Secure IoT in Smart Home System 243 Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS -- 10.1 Introduction -- 10.2 Literature -- 10.3 Method -- 10.4 Chematic Implementation -- 10.5 Simulation and Result -- 10.6 Conclusion -- 11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 267 Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan -- 11.1 Introduction -- 11.2 Intelligent Transport System -- 11.3 Technologies Used in Intelligent Transport Systems -- 11.4 Micro Mobility -- 11.5 Case Study -- 11.6 Methodology: Value--Steam Mapping the Existing Operations -- 11.7 Operational Challenges Faced by Arnab Micro Mobility -- 11.8 Conclusion -- 12 Automatic Booking of LPG and Leakage Detection System Using IoT 291 Aishwarya Jain, Meghana H M and Annaiah H -- 12.1 "What is IoT?" -- 12.2 Why IoT Matters -- 12.2.1 Collecting and Sending Information -- 12.2.2 Receiving and Acting on Information -- 12.2.3 Doing Both: The Goal of an IoT System -- 12.3 The oneM2M IoT Standardized Architecture -- 12.4 The IoT World Forum (IoTWF) Standardized Architecture -- 12.5 A Simplified IoT Architecture -- 12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT -- 12.6.1 Problem Statement -- 12.6.2 Proposed Solution -- 12.6.3 Architecture of the System -- 12.6.4 System Setup -- 12.6.5 Working of System -- 12.7 Conclusion -- References -- Index
- 摘要附注:
- TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library
全部MARC细节信息>>