Trust-based communication systems for internet of things applications / edited by Vishu Madaan, Prateek Agrawal, Anand Sharma, Dilip Kumar Sharma, Akshat Agrawal, Sandeep Kautish.
Contributor(s): Madaan, Vishu [editor.] | Agrawal, Prateek [editor.] | Sharma, Anand [editor.] | Sharma, Dilip Kumar [editor.] | Agrawal, Akshat [editor.] | Kautish, Sandeep [editor.]
Language: English Publisher: Hoboken, NJ : Beverly, MA : Wiley ; Scrivener, 2022Description: 1 online resource (xvii, 316 pages) ; illustrations (chiefly color)Content type: text Media type: computer Carrier type: online resourceISBN: 9781119896746Subject(s): Internet of things | Computer securityGenre/Form: Electronic books.DDC classification: 004.678 LOC classification: TK5105.8857Online resources: Full text is available at Wiley Online Library Click here to view.Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
EBOOK | COLLEGE LIBRARY | COLLEGE LIBRARY | 004.678 T776 2022 (Browse shelf) | Available |
Includes bibliographical references and index.
Preface -- Book Description -- 1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1 Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh -- 1.1 Introduction -- 1.2 Growth of IoT -- 1.3 IoT Technologies -- 1.4 Application Areas of Internet of Things -- 1.5 IoT Security and Protection Concerns -- 1.6 IoT Security -- 1.7 Conclusion -- 2 Blockchain in IoT and Limitations 17 Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Limitations of Blockchain -- 2.4 Conclusion -- 3 IoT Protocol Security Mechanisms 29 D. Karthika and Dr. K. Kalaiselvi -- 3.1 Introduction -- 3.2 Comparing to IoT Security and Cyber-Physical Structures -- 3.3 Potential IoT and the Need for Safety -- 3.4 Future-Cognitive Structures and IoT -- 3.5 Security Engineering for IoT Development -- 3.6 Building Security into Design and Development -- 3.7 Security in Agile Developments -- 3.8 Focusing on the IoT Device in Operation -- 3.9 IoT Security Innovation Cryptographic Basics -- 3.10 Cryptographic Primitive Forms and Implementations in the IoT -- 3.11 Encryption and Decryption -- 3.12 Hashes -- 3.13 Digital Signatures -- 3.14 Generation of Random Numbers -- 3.15 Cloud Security for IoT -- 3.16 Control of Assets/Inventories -- 4 IoT Security, Privacy, Challenges, and Solutions 53 Ankit Garg, Ashima Gambhir and Prachi Goel -- 4.1 Introduction -- 4.1.1 Elements of Internet of Things (IoT) -- 4.2 IoT Landscape: Current and Potential Applications -- 4.3 Advantages of Internet of Things (IoT) -- 4.4 Architecture of IoT Systems -- 4.5 IoT Security -- 4.6 Security Challenges in IoT Architecture -- 4.7 Security by Design in IoT -- 4.8 Best Practices to Secure IoT Devices -- 4.9 Security Attacks in IoT System -- 4.10 Various IoT Security Challenges -- 4.11 Limitations of Available Resources -- 4.12 Solutions to Preserve Privacy in IoT Systems -- 5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 93 Gaurav Jolly and Rahul Johari -- 5.1 Introduction -- 5.2 Cyber Physical System: Definition -- 5.3 System Interfaces -- 5.4 Communication Channel -- 5.5 Physical Interaction -- 5.6 CPS vs IoT -- 5.7 Cyber Physical System Issues -- 5.8 Literature Survey -- 5.9 Applications of Cyber Physical System -- 5.10 Future of Cyber Physical Systems -- 5.11 Conclusion -- 6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 119 Sivasankari Narasimhan -- 6.1 Introduction -- 6.2 Related Works -- 6.3 Trust Calculation Basics -- 6.4 Deriving Trust Relationships -- 6.5 Trust Derivation Examples -- 6.6 Combination of Trust Relationship -- 6.7 Analysis of Attacks -- 6.8 Conclusions -- 7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 135 Prachi Goyal, Ankit Garg and Prakhar Jindal -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Overview of System Architecture -- 7.4 Experiments and Comparison -- 7.5 Database for Experiment -- 7.6 Assessment of the Index Structure -- 7.7 Performance Evaluation of Exact Search -- 7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search -- 7.9 Evaluation of Data Distribution -- 7.10 Conclusion -- 8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 159 Nabeela Hasan and Mansaf Alam -- 8.1 Introduction -- 8.2 An Efficient Approach Towards IIoT Technology -- 8.3 Evolution of IIoT -- 8.4 IIoT Architecture -- 8.5 Industrial Applications of IoT -- 8.6 Smart Manufacturing -- 8.7 Smart Healthcare -- 8.8 Smart Transportation -- 8.9 Smart Cities -- 8.10 Oil and Gas Industry -- 8.11 Logistics and Supply Chain -- 8.12 Basic Technologies of IIoT -- 8.13 Things Over Internet -- 8.14 Technology on Blockchain -- 8.15 Computing of Data Over Cloud Technology -- 8.16 Artificial Intelligence and Cyber Physical Systems -- 8.17 Analytics on Management of Big Data -- 8.18 Future Technologies: Augmented and Virtual Reality -- 8.19 Industry 4.0 -- 8.20 Research Challenges -- 8.20.1 Energy Efficiency -- 8.20.2 Coexistence and Interoperability -- 8.20.3 Real-Time Performance -- 8.20.4 Security and Privacy -- 8.20.5 Fault Detection and Reconfiguration -- 8.20.6 User-Friendliness in Product Deployment and Usage -- 8.21 Conclusions -- 9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 195 Niva Rana Mahanta and Suvarna Lele -- 9.1 Fundamentals of Smart Cities -- 9.2 Case Study Analysis -- 9.3 Smart Buildings in Smart Cities: Humane Approach -- 9.4 Future Scope and Impact on Society -- 9.5 Conclusion -- 10 T-Secure IoT in Smart Home System 243 Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS -- 10.1 Introduction -- 10.2 Literature -- 10.3 Method -- 10.4 Chematic Implementation -- 10.5 Simulation and Result -- 10.6 Conclusion -- 11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 267 Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan -- 11.1 Introduction -- 11.2 Intelligent Transport System -- 11.3 Technologies Used in Intelligent Transport Systems -- 11.4 Micro Mobility -- 11.5 Case Study -- 11.6 Methodology: Value--Steam Mapping the Existing Operations -- 11.7 Operational Challenges Faced by Arnab Micro Mobility -- 11.8 Conclusion -- 12 Automatic Booking of LPG and Leakage Detection System Using IoT 291 Aishwarya Jain, Meghana H M and Annaiah H -- 12.1 "What is IoT?" -- 12.2 Why IoT Matters -- 12.2.1 Collecting and Sending Information -- 12.2.2 Receiving and Acting on Information -- 12.2.3 Doing Both: The Goal of an IoT System -- 12.3 The oneM2M IoT Standardized Architecture -- 12.4 The IoT World Forum (IoTWF) Standardized Architecture -- 12.5 A Simplified IoT Architecture -- 12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT -- 12.6.1 Problem Statement -- 12.6.2 Proposed Solution -- 12.6.3 Architecture of the System -- 12.6.4 System Setup -- 12.6.5 Working of System -- 12.7 Conclusion -- References -- Index.
TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students. The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.
There are no comments for this item.