机读格式显示(MARC)
- 000 08301nam a2200421 a 4500
- 008 220810s2022 njua ob 001 0 eng d
- 020 __ |a 9781119896333 : |c CNY1815.27
- 024 7_ |a 10.1002/9781119896746 |2 doi
- 040 __ |a DG1 |b eng |e rda |e pn |c DG1 |d XDU
- 072 _7 |a TEC |x 041000 |2 bisacsh
- 099 __ |a CAL 022023067805
- 245 00 |a Trust-based communication systems for internet of things applications / |c edited by Prateek Agrawal, Vishu Madaan, Anand Sharma, Dilip Sharma, Akshat Agarwal, and Sandeep Kautish.
- 260 __ |a Hoboken, NJ : |b Wiley ; |a Beverly, MA : |b Scrivener, |c 2022.
- 300 __ |a xvii, 315 pages, |b illustrations ; |c 24 cm.
- 336 __ |a text |b txt |2 rdacontent
- 337 __ |a unmediated |b n |2 rdamedia
- 338 __ |a volume |b nc |2 rdacarrier
- 504 __ |a Includes bibliographical references and index.
- 505 0_ |a Preface -- Book Description -- 1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1 Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh -- 1.1 Introduction -- 1.2 Growth of IoT -- 1.3 IoT Technologies -- 1.4 Application Areas of Internet of Things -- 1.5 IoT Security and Protection Concerns -- 1.6 IoT Security -- 1.7 Conclusion -- 2 Blockchain in IoT and Limitations 17 Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Limitations of Blockchain -- 2.4 Conclusion -- 3 IoT Protocol Security Mechanisms 29 D. Karthika and Dr. K. Kalaiselvi -- 3.1 Introduction -- 3.2 Comparing to IoT Security and Cyber-Physical Structures -- 3.3 Potential IoT and the Need for Safety -- 3.4 Future-Cognitive Structures and IoT -- 3.5 Security Engineering for IoT Development -- 3.6 Building Security into Design and Development -- 3.7 Security in Agile Developments -- 3.8 Focusing on the IoT Device in Operation -- 3.9 IoT Security Innovation Cryptographic Basics -- 3.10 Cryptographic Primitive Forms and Implementations in the IoT -- 3.11 Encryption and Decryption -- 3.12 Hashes -- 3.13 Digital Signatures -- 3.14 Generation of Random Numbers -- 3.15 Cloud Security for IoT -- 3.16 Control of Assets/Inventories -- 4 IoT Security, Privacy, Challenges, and Solutions 53 Ankit Garg, Ashima Gambhir and Prachi Goel -- 4.1 Introduction -- 4.1.1 Elements of Internet of Things (IoT) -- 4.2 IoT Landscape: Current and Potential Applications -- 4.3 Advantages of Internet of Things (IoT) -- 4.4 Architecture of IoT Systems -- 4.5 IoT Security -- 4.6 Security Challenges in IoT Architecture -- 4.7 Security by Design in IoT -- 4.8 Best Practices to Secure IoT Devices -- 4.9 Security Attacks in IoT System -- 4.10 Various IoT Security Challenges -- 4.11 Limitations of Available Resources -- 4.12 Solutions to Preserve Privacy in IoT Systems -- 5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 93 Gaurav Jolly and Rahul Johari -- 5.1 Introduction -- 5.2 Cyber Physical System: Definition -- 5.3 System Interfaces -- 5.4 Communication Channel -- 5.5 Physical Interaction -- 5.6 CPS vs IoT -- 5.7 Cyber Physical System Issues -- 5.8 Literature Survey -- 5.9 Applications of Cyber Physical System -- 5.10 Future of Cyber Physical Systems -- 5.11 Conclusion -- 6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 119 Sivasankari Narasimhan -- 6.1 Introduction -- 6.2 Related Works -- 6.3 Trust Calculation Basics -- 6.4 Deriving Trust Relationships -- 6.5 Trust Derivation Examples -- 6.6 Combination of Trust Relationship -- 6.7 Analysis of Attacks -- 6.8 Conclusions -- 7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 135 Prachi Goyal, Ankit Garg and Prakhar Jindal -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Overview of System Architecture -- 7.4 Experiments and Comparison -- 7.5 Database for Experiment -- 7.6 Assessment of the Index Structure -- 7.7 Performance Evaluation of Exact Search -- 7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search -- 7.9 Evaluation of Data Distribution -- 7.10 Conclusion -- 8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 159 Nabeela Hasan and Mansaf Alam -- 8.1 Introduction -- 8.2 An Efficient Approach Towards IIoT Technology -- 8.3 Evolution of IIoT -- 8.4 IIoT Architecture -- 8.5 Industrial Applications of IoT -- 8.6 Smart Manufacturing -- 8.7 Smart Healthcare -- 8.8 Smart Transportation -- 8.9 Smart Cities -- 8.10 Oil and Gas Industry -- 8.11 Logistics and Supply Chain -- 8.12 Basic Technologies of IIoT -- 8.13 Things Over Internet -- 8.14 Technology on Blockchain -- 8.15 Computing of Data Over Cloud Technology -- 8.16 Artificial Intelligence and Cyber Physical Systems -- 8.17 Analytics on Management of Big Data -- 8.18 Future Technologies: Augmented and Virtual Reality -- 8.19 Industry 4.0 -- 8.20 Research Challenges -- 8.20.1 Energy Efficiency -- 8.20.2 Coexistence and Interoperability -- 8.20.3 Real-Time Performance -- 8.20.4 Security and Privacy -- 8.20.5 Fault Detection and Reconfiguration -- 8.20.6 User-Friendliness in Product Deployment and Usage -- 8.21 Conclusions -- 9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 195 Niva Rana Mahanta and Suvarna Lele -- 9.1 Fundamentals of Smart Cities -- 9.2 Case Study Analysis -- 9.3 Smart Buildings in Smart Cities: Humane Approach -- 9.4 Future Scope and Impact on Society -- 9.5 Conclusion -- 10 T-Secure IoT in Smart Home System 243 Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS -- 10.1 Introduction -- 10.2 Literature -- 10.3 Method -- 10.4 Chematic Implementation -- 10.5 Simulation and Result -- 10.6 Conclusion -- 11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 267 Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan -- 11.1 Introduction -- 11.2 Intelligent Transport System -- 11.3 Technologies Used in Intelligent Transport Systems -- 11.4 Micro Mobility -- 11.5 Case Study -- 11.6 Methodology: Value--Steam Mapping the Existing Operations -- 11.7 Operational Challenges Faced by Arnab Micro Mobility -- 11.8 Conclusion -- 12 Automatic Booking of LPG and Leakage Detection System Using IoT 291 Aishwarya Jain, Meghana H M and Annaiah H -- 12.1 "What is IoT?" -- 12.2 Why IoT Matters -- 12.2.1 Collecting and Sending Information -- 12.2.2 Receiving and Acting on Information -- 12.2.3 Doing Both: The Goal of an IoT System -- 12.3 The oneM2M IoT Standardized Architecture -- 12.4 The IoT World Forum (IoTWF) Standardized Architecture -- 12.5 A Simplified IoT Architecture -- 12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT -- 12.6.1 Problem Statement -- 12.6.2 Proposed Solution -- 12.6.3 Architecture of the System -- 12.6.4 System Setup -- 12.6.5 Working of System -- 12.7 Conclusion -- References -- Index
- 520 __ |a TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library
- 650 _0 |a Internet of things.
- 650 _0 |a Computer security.
- 700 1_ |a Madaan, Vishu, |e editor.
- 700 1_ |a Agrawal, Prateek, |e editor.
- 700 1_ |a Sharma, Anand, |e editor.
- 700 1_ |a Sharma, Dilip, |e editor.
- 700 1_ |a Agrawal, Akshat, |e editor.
- 700 1_ |a Kautish, Sandeep, |e editor.