دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.] نویسندگان: Arun Solanki (editor), Anuj Kumar Singh (editor), Sudeep Tanwar (editor) سری: ISBN (شابک) : 1032431741, 9781032431741 ناشر: CRC Press سال نشر: 2023 تعداد صفحات: 278 [293] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 32 Mb
در صورت تبدیل فایل کتاب Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA] به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری بلاک چین برای IoE: دیدگاه های امنیتی و حریم خصوصی [Team-IRA] نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed framework to provide security in IoE using blockchain technology; Reviews various issues while using distributed ledger technologies for IoE; Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges; Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation. This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.
Cover Half Title Series Information Title Page Copyright Page Table of Contents Preface Overview of the Book About the Editors List of Contributors Part I Introduction to Security of IoE and Blockchain 1 Internet of Everything and Blockchain: An Introduction 1.1 Introduction to the Blockchain and Internet of Things 1.1.1 Blockchain 1.1.2 Limitations of Blockchain 1.1.3 Internet of Things 1.1.4 Internet of Everything 1.2 Literature Review 1.3 IoE and Blockchain Technology Protection Using Reverse Engineering and Malware Analysis 1.3.1 Introduction to Reverse Engineering 1.3.2 Malware Analysis 1.3.3 Important Aspect of IoT: Firmware and Firmware Analysis 1.4 Case Study 1 1.4.1 Working 1.5 Conclusion References 2 Security Requirements, Issues, and Challenges in IoE 2.1 Introduction to the Internet of Everything (IoE) 2.2 What Is the Internet of Everything (IoE) 2.3 Definition 2.3.1 Essential Security Requirements in IoE 2.3.2 Confidentiality 2.3.3 Integrity 2.3.4 Availability 2.3.5 Authenticity 2.3.6 Non-Repudiation 2.3.7 Access Control and Authorization 2.3.8 Trustworthy Computing 2.3.9 Denial-Of-Service Protection 2.3.10 Privacy 2.4 IoE Secure Framework 2.4.1 The Process of Authentication 2.4.2 The Process of Authentication Control and Access 2.4.3 The Network Enforce Scheme 2.5 The Top Five Security Protocols 2.5.1 The Message Queen Telemetry Transport Protocol 2.5.2 Constraint-Based Application Protocols 2.5.3 Datagram Security Protocol 2.5.4 IPv6LPAN 2.5.5 ZigBee 2.5.5.1 The Centralized Network Models 2.5.5.2 The Distributed Network Models 2.6 The Major Internet of Everything Security Solution 2.7 The Reason Behind Vulnerability and Requirements of Safety 2.8 Major Security Solutions 2.9 Conclusion and Future Scope References 3 IoE and Blockchain Convergence for Enhanced Security 3.1 Introduction 3.2 Current Status of IoE in the Market 3.3 Blockchain Technology 3.3.1 Several Kinds of Blockchain Networks 3.3.1.1 Permission-Less Blockchain 3.3.1.2 Permissioned Blockchain 3.3.2 Consensus Algorithms (CA) 3.3.2.1 PoW 3.3.2.2 PoS 3.3.3 Blockchain Standards 3.4 Cyber Resilience of PUFs 3.4.1 Man-In-The-Middle (MITM) 3.4.2 Side Channel Attacks 3.5 Proof-Of-PUF Authentication in the Internet of Everything 3.6 Applications 3.7 Existing Challenges 3.8 Future Prospects 3.9 Advantages of the Study 3.10 Conclusion References Part II Blockchain-Based Security Mechanisms for IoE 4 Security Model and Access Control Mechanisms for Attack Mitigation in IoE 4.1 Introduction 4.1.1 Background of IoE 4.1.2 Advantage of IoE 4.1.3 Challenges in IoE 4.1.3.1 Authenticity 4.1.3.2 Reliability 4.1.3.3 Stability 4.1.3.4 Security Challenges 4.1.4 Requirement in IoE 4.1.4.1 Security in IoE 4.1.4.2 Privacy in IoE 4.1.5 Main Concepts and Terms in IoE 4.1.5.1 Cyber Security 4.1.5.2 Cyber Threats 4.1.6 Formulating Secure IOE Frameworks 4.1.6.1 Authentication 4.1.6.2 Authorization 4.1.6.3 Network Imposed Strategy 4.1.6.4 Secure Evaluation (Visibility and Control) 4.2 Intruder Detection in IoE 4.2.1 The Ways for an Intruder to Make an Attack in the Organization 4.2.2 Threat Scenarios 4.2.3 Background of Intruder Detection System 4.2.4 Categorization of IDS 4.2.4.1 Based On the Place of Detection 4.2.4.2 Based On Detection Performance 4.3 User Access Security Based On Block Chain Technology 4.3.1 Block Chain Advancements 4.3.2 Blockchain 4.3.3 The Smart Contract 4.4 Role of Artificial Intelligence in Attack Detection Model 4.4.1 Artificial Immune-Based IDSs 4.4.2 Artificial Neural Network Based IDSs 4.4.3 Genetic Algorithm-Based IDSs 4.5 Upcoming Trends in AI Using Optimization Algorithms 4.5.1 Evolutionary Algorithm 4.5.1.1 Genetic Programming (GP) 4.5.1.2 Genetic Calculation 4.5.1.3 Evolution Procedures 4.5.2 Swarm-Based Algorithm 4.5.2.1 Ant Colony Optimization (ACO) 4.5.2.2 Particle Swarm Optimization 4.5.2.3 Bee Colony Algorithm 4.5.2.4 Fish Swarm Algorithm 4.5.2.5 Firefly Algorithm (FA) 4.5.3 Ecology-Based Calculations 4.6 Key Findings 4.7 Conclusion References 5 Enhancement of Security of Messages in Blockchain-Based IoE With Modified Proof-Of-Authentication (MPoAh) 5.1 Introduction 5.2 Related Works 5.3 Proposed Scheme 5.3.1 Device Identity and Devices Registration Process 5.3.2 Device Intercommunication and Dependable Communications 5.3.3 Modified Proof-Of-Authentication (MPoAh) Algorithm and Transaction Verification 5.4 Implementation of the Proposed Scheme 5.5 Security Analysis, Results, and Comparisons 5.5.1 Analysis of Security 5.5.2 Comparisons and Results 5.6 Conclusion and Future Work References 6 Machine Learning (ML) and Blockchain for IoE: A Deep Insight Into Framework, Security, and Its Applications With Industrial IoE 6.1 Introduction 6.2 Fundamental Concepts of Machine Learning and Blockchain 6.3 Recent Developments (And Related Works) 6.4 Overview of Tentative Industrial IoE Framework 6.5 Security and Privacy Issues in Industrial IoE 6.6 Future Scope 6.7 Conclusion and Future Scope References 7 Biometric Authentication in Internet of Everything 7.1 Introduction 7.2 Evolution of IoE 7.3 The Architecture of Two-Factor Authentication Works With Blockchain Technology 7.4 Security and Privacy Challenges of IoE 7.4.1 User Privacy and Data Protection in IoE 7.4.2 Authentication and Identity Management 7.4.3 Trust Management and Policy Integration 7.4.4 Authorization and Access Control 7.4.5 End-To-End Security 7.4.6 Attack Resistant Security Solution 7.5 Applications of IoE 7.6 Use Cases of IOE 7.6.1 Supply Chain 7.6.2 Automotive Industry 7.6.3 Smart Homes 7.6.4 Sharing Economy 7.6.5 Pharmacy Industry 7.6.6 Agriculture 7.6.7 Water Management 7.7 Challenges of IoE 7.8 Conclusion References 8 High Data Priority Endorsement and Profile Overhaul Using Blockchain Against Remapping Attack in MANET-IoT 8.1 Introduction 8.2 Local Repair 8.2.1 Proactive Approach 8.2.2 Re-Activate Approach 8.3 Important Challenges in MANET 8.3.1 Dynamic Topologies 8.3.2 Routing 8.3.3 Power-Constrained and Operational 8.3.4 Security and Reliability 8.3.5 Quality of Service (QoS) 8.3.6 Inter-Networking 8.3.7 Mobile Routing at the IP Or Routing Layer 8.4 Routing Protocols Overview 8.4.1 Proactive Routing Protocol (Table-Driven) 8.4.2 Reactive Routing (On-Demand) 8.4.3 Hybrid Routing Protocol 8.5 Block Chain Security Considerations in MANET-IoT 8.6 Types of Attack in MANET-IoT 8.6.1 The Active Attack 8.6.2 Passive Attack 8.6.2.1 External Attack 8.6.2.2 Internal Attack 8.6.3 Security Threats in MANET 8.7 Literature Review 8.8 Problem Statement 8.9 Proposed Block Chain Technique for Remapping Attack 8.9.1 Proposed Algorithm to Hash Generation for Block Chain-Based Security 8.9.2 Proposed Working Architecture 8.10 Simulation Tool, Parameters and Performance Metrics 8.10.1 Simulation Parameters to Be Used in the Case Study 8.10.2 Performance Metrics 8.11 Simulation Outcomes 8.11.1 Analysis of the UDP End Data Stream 8.11.2 Analysis of the Routing Packets Flooding 8.11.3 TCP PDR Analysis 8.11.4 End-To-End Delay Analysis 8.11.5 Routing Load Analysis 8.11.6 An Examination of the Flooding of Attackers 8.11.7 Analysis of Drops Caused By Congestion 8.12 Conclusion and Future Work References Part III Application Areas Integrating Blockchain and IoE 9 Block Chain Applications and Case Studies for IoE 9.1 Introduction 9.1.1 Block 9.1.2 Chain 9.1.3 System 9.2 Background 9.3 Applications of Block Chain 9.3.1 Cryptocurrency 9.3.2 Being Aware 9.3.3 Strategy 9.3.4 Food Industry 9.3.5 Mobile Commerce 9.3.6 Big Data 9.4 Bitcoin for IoT 9.5 Internet of Everything (IoE) 9.6 Applications of the Internet of Everything 9.6.1 IoE in Smart Airports 9.6.2 IoE in Smart District 9.6.3 Environmental Surveillance 9.6.4 Smart Cities 9.6.5 Energy Sector 9.6.6 Blockchain in the IoE 9.6.7 Smart Water Management 9.6.8 Smart Apartments 9.7 Components to an IoE Environment 9.7.1 People 9.7.2 Processes 9.7.3 Data 9.7.4 Things 9.8 Characteristics of Internet of Everything 9.8.1 Connectivity 9.8.2 Intelligence 9.8.3 Dynamic Nature 9.8.4 Security 9.8.5 Sensing 9.8.6 Heterogeneity 9.8.7 Enormous Scale 9.9 Advantages of IoT 9.10 Key Features of IoE 9.11 Conclusion References 10 An Anti-Counterfeiting Architecture Ensuring Authenticity and Traceability for Expensive Medicines Using QR Codes 10.1 Introduction 10.2 Related Works 10.3 Preliminaries 10.3.1 Encryption 10.3.2 QR Codes 10.3.3 Website and Database 10.3.4 Blockchain 10.3.4.1 Blockchain Functionalities 10.3.4.2 Smart Contract 10.3.4.3 Types of Blockchain 10.3.5 Hyperledger Fabric 10.3.5.1 Hyperledger Fabric Architecture 10.3.6 Security Definition 10.4 Proposed Method 10.4.1 Working Procedure 10.4.2 Data Transition Overview 10.5 Security Analysis 10.6 Implementation Details 10.6.1 Workflow 10.6.2 Blockchain Implementation 10.7 Result Analysis 10.7.1 Centralized Database Analysis 10.7.2 Blockchain Analysis 10.7.3 Centralized Database Vs Blockchain 10.7.4 Cryptographic Functions 10.8 Conclusion References 11 Reducing Counterfeit Medicine Through Blockchain 11.1 Introduction 11.1.1 Drivers in the Pharmaceutical Industry 11.1.2 Design Issues in the Pharmaceutical Business Logistics Chain 11.2 Blockchain Technology in the Pharmaceutical Industry 11.2.1 Counterfeit Prevention 11.2.2 Merchandise Issuance Channel 11.2.3 Tracking and Tracing 11.2.4 Safety and Security 11.3 Challenges in Current Blockchain 11.3.1 Agility in Mitigating Drug Shortage 11.4 Counterfeit Drug Prevention: A Critical Review and Some Insights 11.5 Design of Drug Supplychain Framework for Optimization 11.5.1 Development Environment 11.5.2 Building Component of Business Network 11.5.3 Smart Contract Modeling of Drug Business Logistics Management 11.5.4 Planning and Scheduling of Drug Supply Chain Management 11.6 Digital Medicine and Blockchain: New Research Avenues 11.6.1 Open Challenges 11.7 Conclusion References 12 Home Automation Using Block Chain-Enabled Cyber Physical System 12.1 Introduction 12.2 Background 12.3 The Proposed System Design 12.3.1 The Architecture of the Proposed System 12.3.2 Mapping of Proposed System With 5C Protocol 12.3.3 The Proposed System Operation 12.3.4 The Implementation Details of the Proposed System 12.4 Conclusion 12.5 Challenges and Future Aspects References Index