ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA]

دانلود کتاب فناوری بلاک چین برای IoE: دیدگاه های امنیتی و حریم خصوصی [Team-IRA]

Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA]

مشخصات کتاب

Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA]

ویرایش: [1 ed.] 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 1032431741, 9781032431741 
ناشر: CRC Press 
سال نشر: 2023 
تعداد صفحات: 278
[293] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 32 Mb 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA] به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری بلاک چین برای IoE: دیدگاه های امنیتی و حریم خصوصی [Team-IRA] نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری بلاک چین برای IoE: دیدگاه های امنیتی و حریم خصوصی [Team-IRA]




توضیحاتی درمورد کتاب به خارجی

This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed framework to provide security in IoE using blockchain technology; Reviews various issues while using distributed ledger technologies for IoE; Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges; Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation. This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.



فهرست مطالب

Cover
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
Preface
Overview of the Book
About the Editors
List of Contributors
Part I Introduction to Security of IoE and Blockchain
	1 Internet of Everything and Blockchain: An Introduction
		1.1 Introduction to the Blockchain and Internet of Things
			1.1.1 Blockchain
			1.1.2 Limitations of Blockchain
			1.1.3 Internet of Things
			1.1.4 Internet of Everything
		1.2 Literature Review
		1.3 IoE and Blockchain Technology Protection Using Reverse Engineering and Malware Analysis
			1.3.1 Introduction to Reverse Engineering
			1.3.2 Malware Analysis
			1.3.3 Important Aspect of IoT: Firmware and Firmware Analysis
		1.4 Case Study 1
			1.4.1 Working
		1.5 Conclusion
		References
	2 Security Requirements, Issues, and Challenges in IoE
		2.1 Introduction to the Internet of Everything (IoE)
		2.2 What Is the Internet of Everything (IoE)
		2.3 Definition
			2.3.1 Essential Security Requirements in IoE
			2.3.2 Confidentiality
			2.3.3 Integrity
			2.3.4 Availability
			2.3.5 Authenticity
			2.3.6 Non-Repudiation
			2.3.7 Access Control and Authorization
			2.3.8 Trustworthy Computing
			2.3.9 Denial-Of-Service Protection
			2.3.10 Privacy
		2.4 IoE Secure Framework
			2.4.1 The Process of Authentication
			2.4.2 The Process of Authentication Control and Access
			2.4.3 The Network Enforce Scheme
		2.5 The Top Five Security Protocols
			2.5.1 The Message Queen Telemetry Transport Protocol
			2.5.2 Constraint-Based Application Protocols
			2.5.3 Datagram Security Protocol
			2.5.4 IPv6LPAN
			2.5.5 ZigBee
				2.5.5.1 The Centralized Network Models
				2.5.5.2 The Distributed Network Models
		2.6 The Major Internet of Everything Security Solution
		2.7 The Reason Behind Vulnerability and Requirements of Safety
		2.8 Major Security Solutions
		2.9 Conclusion and Future Scope
		References
	3 IoE and Blockchain Convergence for Enhanced Security
		3.1 Introduction
		3.2 Current Status of IoE in the Market
		3.3 Blockchain Technology
			3.3.1 Several Kinds of Blockchain Networks
				3.3.1.1 Permission-Less Blockchain
				3.3.1.2 Permissioned Blockchain
			3.3.2 Consensus Algorithms (CA)
				3.3.2.1 PoW
				3.3.2.2 PoS
			3.3.3 Blockchain Standards
		3.4 Cyber Resilience of PUFs
			3.4.1 Man-In-The-Middle (MITM)
			3.4.2 Side Channel Attacks
		3.5 Proof-Of-PUF Authentication in the Internet of Everything
		3.6 Applications
		3.7 Existing Challenges
		3.8 Future Prospects
		3.9 Advantages of the Study
		3.10 Conclusion
		References
Part II Blockchain-Based Security Mechanisms for IoE
	4 Security Model and Access Control Mechanisms for Attack Mitigation in IoE
		4.1 Introduction
			4.1.1 Background of IoE
			4.1.2 Advantage of IoE
			4.1.3 Challenges in IoE
				4.1.3.1 Authenticity
				4.1.3.2 Reliability
				4.1.3.3 Stability
				4.1.3.4 Security Challenges
			4.1.4 Requirement in IoE
				4.1.4.1 Security in IoE
				4.1.4.2 Privacy in IoE
			4.1.5 Main Concepts and Terms in IoE
				4.1.5.1 Cyber Security
				4.1.5.2 Cyber Threats
			4.1.6 Formulating Secure IOE Frameworks
				4.1.6.1 Authentication
				4.1.6.2 Authorization
				4.1.6.3 Network Imposed Strategy
				4.1.6.4 Secure Evaluation (Visibility and Control)
		4.2 Intruder Detection in IoE
			4.2.1 The Ways for an Intruder to Make an Attack in the Organization
			4.2.2 Threat Scenarios
			4.2.3 Background of Intruder Detection System
			4.2.4 Categorization of IDS
				4.2.4.1 Based On the Place of Detection
				4.2.4.2 Based On Detection Performance
		4.3 User Access Security Based On Block Chain Technology
			4.3.1 Block Chain Advancements
			4.3.2 Blockchain
			4.3.3 The Smart Contract
		4.4 Role of Artificial Intelligence in Attack Detection Model
			4.4.1 Artificial Immune-Based IDSs
			4.4.2 Artificial Neural Network Based IDSs
			4.4.3 Genetic Algorithm-Based IDSs
		4.5 Upcoming Trends in AI Using Optimization Algorithms
			4.5.1 Evolutionary Algorithm
				4.5.1.1 Genetic Programming (GP)
				4.5.1.2 Genetic Calculation
				4.5.1.3 Evolution Procedures
			4.5.2 Swarm-Based Algorithm
				4.5.2.1 Ant Colony Optimization (ACO)
				4.5.2.2 Particle Swarm Optimization
				4.5.2.3 Bee Colony Algorithm
				4.5.2.4 Fish Swarm Algorithm
				4.5.2.5 Firefly Algorithm (FA)
			4.5.3 Ecology-Based Calculations
		4.6 Key Findings
		4.7 Conclusion
		References
	5 Enhancement of Security of Messages in Blockchain-Based IoE With Modified Proof-Of-Authentication (MPoAh)
		5.1 Introduction
		5.2 Related Works
		5.3 Proposed Scheme
			5.3.1 Device Identity and Devices Registration Process
			5.3.2 Device Intercommunication and Dependable Communications
			5.3.3 Modified Proof-Of-Authentication (MPoAh) Algorithm and Transaction Verification
		5.4 Implementation of the Proposed Scheme
		5.5 Security Analysis, Results, and Comparisons
			5.5.1 Analysis of Security
			5.5.2 Comparisons and Results
		5.6 Conclusion and Future Work
		References
	6 Machine Learning (ML) and Blockchain for IoE: A Deep Insight Into Framework, Security, and Its Applications With Industrial IoE
		6.1 Introduction
		6.2 Fundamental Concepts of Machine Learning and Blockchain
		6.3 Recent Developments (And Related Works)
		6.4 Overview of Tentative Industrial IoE Framework
		6.5 Security and Privacy Issues in Industrial IoE
		6.6 Future Scope
		6.7 Conclusion and Future Scope
		References
	7 Biometric Authentication in Internet of Everything
		7.1 Introduction
		7.2 Evolution of IoE
		7.3 The Architecture of Two-Factor Authentication Works With Blockchain Technology
		7.4 Security and Privacy Challenges of IoE
			7.4.1 User Privacy and Data Protection in IoE
			7.4.2 Authentication and Identity Management
			7.4.3 Trust Management and Policy Integration
			7.4.4 Authorization and Access Control
			7.4.5 End-To-End Security
			7.4.6 Attack Resistant Security Solution
		7.5 Applications of IoE
		7.6 Use Cases of IOE
			7.6.1 Supply Chain
			7.6.2 Automotive Industry
			7.6.3 Smart Homes
			7.6.4 Sharing Economy
			7.6.5 Pharmacy Industry
			7.6.6 Agriculture
			7.6.7 Water Management
		7.7 Challenges of IoE
		7.8 Conclusion
		References
	8 High Data Priority Endorsement and Profile Overhaul Using Blockchain Against Remapping Attack in MANET-IoT
		8.1 Introduction
		8.2 Local Repair
			8.2.1 Proactive Approach
			8.2.2 Re-Activate Approach
		8.3 Important Challenges in MANET
			8.3.1 Dynamic Topologies
			8.3.2 Routing
			8.3.3 Power-Constrained and Operational
			8.3.4 Security and Reliability
			8.3.5 Quality of Service (QoS)
			8.3.6 Inter-Networking
			8.3.7 Mobile Routing at the IP Or Routing Layer
		8.4 Routing Protocols Overview
			8.4.1 Proactive Routing Protocol (Table-Driven)
			8.4.2 Reactive Routing (On-Demand)
			8.4.3 Hybrid Routing Protocol
		8.5 Block Chain Security Considerations in MANET-IoT
		8.6 Types of Attack in MANET-IoT
			8.6.1 The Active Attack
			8.6.2 Passive Attack
				8.6.2.1 External Attack
				8.6.2.2 Internal Attack
			8.6.3 Security Threats in MANET
		8.7 Literature Review
		8.8 Problem Statement
		8.9 Proposed Block Chain Technique for Remapping Attack
			8.9.1 Proposed Algorithm to Hash Generation for Block Chain-Based Security
			8.9.2 Proposed Working Architecture
		8.10 Simulation Tool, Parameters and Performance Metrics
			8.10.1 Simulation Parameters to Be Used in the Case Study
			8.10.2 Performance Metrics
		8.11 Simulation Outcomes
			8.11.1 Analysis of the UDP End Data Stream
			8.11.2 Analysis of the Routing Packets Flooding
			8.11.3 TCP PDR Analysis
			8.11.4 End-To-End Delay Analysis
			8.11.5 Routing Load Analysis
			8.11.6 An Examination of the Flooding of Attackers
			8.11.7 Analysis of Drops Caused By Congestion
		8.12 Conclusion and Future Work
		References
Part III Application Areas Integrating Blockchain and IoE
	9 Block Chain Applications and Case Studies for IoE
		9.1 Introduction
			9.1.1 Block
			9.1.2 Chain
			9.1.3 System
		9.2 Background
		9.3 Applications of Block Chain
			9.3.1 Cryptocurrency
			9.3.2 Being Aware
			9.3.3 Strategy
			9.3.4 Food Industry
			9.3.5 Mobile Commerce
			9.3.6 Big Data
		9.4 Bitcoin for IoT
		9.5 Internet of Everything (IoE)
		9.6 Applications of the Internet of Everything
			9.6.1 IoE in Smart Airports
			9.6.2 IoE in Smart District
			9.6.3 Environmental Surveillance
			9.6.4 Smart Cities
			9.6.5 Energy Sector
			9.6.6 Blockchain in the IoE
			9.6.7 Smart Water Management
			9.6.8 Smart Apartments
		9.7 Components to an IoE Environment
			9.7.1 People
			9.7.2 Processes
			9.7.3 Data
			9.7.4 Things
		9.8 Characteristics of Internet of Everything
			9.8.1 Connectivity
			9.8.2 Intelligence
			9.8.3 Dynamic Nature
			9.8.4 Security
			9.8.5 Sensing
			9.8.6 Heterogeneity
			9.8.7 Enormous Scale
		9.9 Advantages of IoT
		9.10 Key Features of IoE
		9.11 Conclusion
		References
	10 An Anti-Counterfeiting Architecture Ensuring Authenticity and Traceability for Expensive Medicines Using QR Codes
		10.1 Introduction
		10.2 Related Works
		10.3 Preliminaries
			10.3.1 Encryption
			10.3.2 QR Codes
			10.3.3 Website and Database
			10.3.4 Blockchain
				10.3.4.1 Blockchain Functionalities
				10.3.4.2 Smart Contract
				10.3.4.3 Types of Blockchain
			10.3.5 Hyperledger Fabric
				10.3.5.1 Hyperledger Fabric Architecture
			10.3.6 Security Definition
		10.4 Proposed Method
			10.4.1 Working Procedure
			10.4.2 Data Transition Overview
		10.5 Security Analysis
		10.6 Implementation Details
			10.6.1 Workflow
			10.6.2 Blockchain Implementation
		10.7 Result Analysis
			10.7.1 Centralized Database Analysis
			10.7.2 Blockchain Analysis
			10.7.3 Centralized Database Vs Blockchain
			10.7.4 Cryptographic Functions
		10.8 Conclusion
		References
	11 Reducing Counterfeit Medicine Through Blockchain
		11.1 Introduction
			11.1.1 Drivers in the Pharmaceutical Industry
			11.1.2 Design Issues in the Pharmaceutical Business Logistics Chain
		11.2 Blockchain Technology in the Pharmaceutical Industry
			11.2.1 Counterfeit Prevention
			11.2.2 Merchandise Issuance Channel
			11.2.3 Tracking and Tracing
			11.2.4 Safety and Security
		11.3 Challenges in Current Blockchain
			11.3.1 Agility in Mitigating Drug Shortage
		11.4 Counterfeit Drug Prevention: A Critical Review and Some Insights
		11.5 Design of Drug Supplychain Framework for Optimization
			11.5.1 Development Environment
			11.5.2 Building Component of Business Network
			11.5.3 Smart Contract Modeling of Drug Business Logistics Management
			11.5.4 Planning and Scheduling of Drug Supply Chain Management
		11.6 Digital Medicine and Blockchain: New Research Avenues
			11.6.1 Open Challenges
		11.7 Conclusion
		References
	12 Home Automation Using Block Chain-Enabled Cyber Physical System
		12.1 Introduction
		12.2 Background
		12.3 The Proposed System Design
			12.3.1 The Architecture of the Proposed System
			12.3.2 Mapping of Proposed System With 5C Protocol
			12.3.3 The Proposed System Operation
			12.3.4 The Implementation Details of the Proposed System
		12.4 Conclusion
		12.5 Challenges and Future Aspects
		References
Index




نظرات کاربران