دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Augusto Casaca (editor), Srinivas Katkoori (editor), Sandip Ray (editor), Leon Strous (editor) سری: ISBN (شابک) : 3030436047, 9783030436049 ناشر: Springer سال نشر: 2020 تعداد صفحات: 333 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 51 مگابایت
در صورت تبدیل فایل کتاب Internet of Things. A Confluence of Many Disciplines: Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 – ... and Communication Technology, 574) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اینترنت اشیا تلاقی بسیاری از رشته ها: دومین کنفرانس بین المللی بین دامنه ای IFIP، IFIPoT 2019، تامپا، FL، ایالات متحده آمریکا، 31 اکتبر - ... و فناوری ارتباطات، 574) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات داوری پس از کنفرانس دومین کنفرانس بینالمللی بیندامنهای IFIP در اینترنت اشیاء، IFIPoT 2019، در تامپا، ایالات متحده آمریکا، در اکتبر/ نوامبر 2019 است.</ p>
11 مقاله کامل ارائه شده به دقت بررسی و از بین 22 مقاله ارسالی انتخاب شدند. همچنین در این جلد 8 مقاله دعوت شده گنجانده شده است. مقالات در بخش های موضوعی زیر سازماندهی شده اند: برنامه های کاربردی اینترنت اشیا. استدلال زمینه و آگاهی موقعیتی؛ امنیت اینترنت اشیا؛ اینترنت اشیاء هوشمند و کم مصرف؛ معماری شبکه های هوشمند؛ و طراحی سیستم هوشمند و آموزش اینترنت اشیا.
This book constitutes the refereed post-conference proceedings of the Second IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2019, held in Tampa, USA, in October/ November 2019.
The 11 full papers presented were carefully reviewed and selected from 22 submissions. Also included in this volume are 8 invited papers. The papers are organized in the following topical sections: IoT applications; context reasoning and situational awareness; IoT security; smart and low power IoT; smart network architectures; and smart system design and IoT education.
Preface Organization Contents IoT Applications Architecting Systems-of-Systems of Self-driving Cars for Platooning on the Internet-of-Vehicles with SosADL Abstract 1 Introduction 2 Internet-of-Vehicles and Vehicle Platooning 3 Enhancing SosADL for the Internet-of-Vehicles 3.1 Extending SosADL with Digital Twins of “Things” 3.2 Constructs for Autonomous Constituent Systems in SosADL 3.3 Extending SosADL with Constructs for Connected Constituent Systems 4 SoS Architecture Description for UGV-Based Platooning 5 SosADL Implementation 6 SosADL Validation for the IoV by Controlled Experiment 7 Related Work 8 Conclusion and Future Work References Energy Efficiency in Smart Buildings: An IoT-Based Air Conditioning Control System 1 Introduction 2 Related Work 3 Smart Place 3.1 Hardware Devices 3.2 Middleware 3.3 Web Platform 4 Results and Discussion 5 Concluding Remarks References Toward Blockchain Technology in IoT Applications: An Analysis for E-health Applications 1 Introduction 2 Background 2.1 Internet of Things and E-health 2.2 Blockchain 3 Related Work 4 Description of Our Approach 5 Experimental Design 5.1 Goals 5.2 Materials and Methods 5.3 Metrics 6 Experiments and Results 6.1 Discussion 7 Conclusion References Context Reasoning and Situational Awareness I2VSM Approach: Self-monitoring of Patients Exploring Situational Awareness in IoT 1 Introduction 2 Scope 2.1 Situational Awareness 2.2 Vital Signs 2.3 Tracking and Monitoring Scoring Systems 2.4 Medical Information Mart for Intensive Care (MIMIC) 3 Related Works 4 EXEHDA Middleware 5 I2VSM: Conception and Functionalities 5.1 Environment Interoperation Block 5.2 Edge Processing Block 5.3 User Interface Block 6 I2VSM: Evaluation 7 Final Considerations References An IoT Proposal for the Irrigation Management Exploring Context Awareness 1 Introduction 2 Background 2.1 Context Awareness 2.2 EXEHDA Middleware 3 Related Work 4 EXEHDA-SF: Organization and Functionalities 4.1 Environment Interoperation Block 4.2 Irrigation Control Block 4.3 User Interface Block 5 EXEHDA-SF: Prototyping and Results 5.1 Hardware Adopted 5.2 Software Frameworks Adopted 5.3 Evaluation 6 Conclusions References An IoT Architecture to Provide Hybrid Context Reasoning 1 Introduction 2 Related Work 3 Software Architecture Proposed 4 Evaluation 5 Conclusion References IoT Security REDEM: Real-Time Detection and Mitigation of Communication Attacks in Connected Autonomous Vehicle Applications 1 Introduction 2 Background and Related Work 2.1 Connected Car Applications and Security Challenges 2.2 State of the Practice and Related Research 3 REDEM Vision 3.1 Design Constraints 3.2 REDEM Approach and Viability 3.3 Threat Model and Design Assumptions 4 REDEM On-board Architecture 5 Prediction Models 6 REDEM Evaluation 7 Case Study: Secure CACC 7.1 CACC Functional Overview 7.2 REDEM for CACC 8 Conclusion and Future Work References Trust in IoT Devices: A Logic Encryption Perspective 1 Introduction 2 Logic Encryption Techniques 3 Logic Decryption Strategies 4 Attack Resiliency of Encryption Schemes 5 Cost Analysis - Area and Power 5.1 Experimental Setup 5.2 Results 6 Conclusion References Latent Space Modeling for Cloning Encrypted PUF-Based Authentication 1 Introduction 2 Background and Related Work 2.1 Physically Unclonable Functions 2.2 PUFs for IoT Node Security 2.3 Cloning Attacks on PUF Models 2.4 Encryption Protocols for IoT Node Authentication 3 Learning a Latent Subspace for Encrypted CRPs 3.1 Variational Autoencoders 3.2 Multi-headed Decoding for Robust Latent Subspace Modeling 3.3 Implementation Details and Training Strategy 4 Experimental Evaluation 4.1 Baseline Approach: A Brute Force Attack on Encrypted PUFs 4.2 Quantitative Evaluation 5 Conclusion and Future Work References Lightweight Countermeasure to Differential-Plaintext Attacks on Permutation Ciphers 1 Introduction 2 Background and Related Work 2.1 Cryptography and Information Security 2.2 PRESENT-80 Cipher 2.3 Attack Model 2.4 Interconnection Networks 2.5 Interconnection Networks in Crpytography 2.6 Key-Dependency in Cryptography 3 Key-Dependent Interconnection Network Structures 4 Experimental Evaluation 4.1 Analysis of Results 5 Analysis 5.1 Differential-Plaintext Attacks 5.2 Application to SBox 5.3 Application to Other Ciphers 5.4 Use with Other Methods 6 Conclusion References Smart and Low Power IoT Challenges in the Design of Integrated Systems for IoT Abstract 1 Introduction 2 Internet of Things 3 Power Consumption 4 Reliability 5 Security 6 3D Circuits 7 Hardware Accelerators 8 Conclusions Acknowledgements References Mixed Precision Quantization Scheme for Re-configurable ReRAM Crossbars Targeting Different Energy Harvesting Scenarios 1 Introduction 2 Background and Related Work 2.1 Quantized Neural Networks 2.2 ReRAM Crossbar-Based Accelerator 2.3 Energy Harvesting System 3 Quantization for Different Power Levels 4 Precision Configurable ReRAM Crossbar 5 Power Prediction 5.1 NN-Based Power Prediction 5.2 Augmented Power Prediction 6 Experiments 6.1 Experimental Settings 6.2 Results 7 Conclusion References Smart Network Architectures Toward Holistic Integration of Computing and Wireless Networking 1 Introduction 2 Applications of ML in IoT Wireless Networking 2.1 MAC Protocol: Wireless Access, Routing and Others 2.2 MEC: Caching and Offloading 2.3 IoT Security and Reliability 2.4 Low-Power Operation and Sensor Networks 3 Machine Learning in Smart Factory 3.1 Computing and Networking Systems in Smart Factories 3.2 Vertical Integration 3.3 Horizontal Integration 4 Future Networking and Computing Architecture 4.1 State-of-the-Art Applications of Machine Learning to Future Wireless Network Architecture 4.2 Networked Multi-agent Systems 5 Conclusions References The Thing About the Internet of Things: Scoping the Social Science Discourse in IoT Research Abstract 1 Introduction 2 Research Methodology 2.1 Literature Selection 2.2 Literature Analysis 3 Results 3.1 Keywords Within the Social Science Subject-Field Literature 3.2 Themes Based on Keywords from the Social Science Subject-Field Litterature Analysis 4 Discussion 4.1 Suggestions for a New Thematic Scope 4.2 Why Should the Social Sciences Care 5 Conclusions and Suggestions for Future Research References Evaluating Edge Processing Requirements in Next Generation IoT Network Architectures 1 Introduction 2 Background 2.1 IoT Architectures 2.2 Image Processing 3 Edge Node Design and Analysis Framework 3.1 Limited Network Connectivity 3.2 Privacy and Security Concerns 3.3 Transmission Power Exceeds Local Processing Power 4 Preliminary Results 5 Conclusion References Smart System Design and IoT Education Good-Eye: A Combined Computer-Vision and Physiological-Sensor Based Device for Full-Proof Prediction and Detection of Fall of Adults 1 Introduction 2 Related Research Overview 3 Novel Contributions 4 Are Falls Related to Physiological Parameters? 4.1 Sweat 4.2 Heart Rates and Blood Pressures 4.3 Temperature 4.4 Vision 5 System Level Modeling of Good-Eye 5.1 Architecture of Good-Eye 5.2 The Parameters Considered for Good-Eye System 5.3 Design Flow 5.4 Parameter Analysis Unit 5.5 Fall Prediction and Detection Unit 5.6 Working Principle of the Proposed Good-Eye Model 6 Implementation and Validation 6.1 Implementation 6.2 Validation 7 Conclusions and Future Research References Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory 1 Introduction 1.1 Need for Promoting Education in IoT Security 1.2 Need for Low-Cost and High-Quality Hardware Platforms for IoT Security Education 2 A Capable and Low-Cost IoT Laboratory 2.1 Low-Cost IoT Development Kit and Laboratory 2.2 Creating an Integrated Development Environment (IDE) for IoT Security Education 3 Developing Teaching Labs for IoT Security 3.1 Developing Teaching Modules on Hardware Security 3.2 Developing Teaching Modules on Secure Key Storage on ESP32 3.3 Developing Teaching Modules on System/Firmware Security 3.4 Developing Teaching Modules on Data Security 3.5 Developing Teaching Modules on Network Security on ESP32 3.6 Developing Teaching Modules on Secure Firmware Upgrade 3.7 Secure Over-the-Air Updates (OTA) on ESP32 3.8 Developing Teaching Modules on Crypto Co-processor 3.9 Developing Case Studies 4 Conclusion References Curriculum Design Requirements and Challenges for the First Bachelor\'s Degree on IoT in the US 1 Introduction 2 Where Is the Need? 2.1 IoT vs Computer Science/Engineering 2.2 IoT vs IT 3 IoT Technology Degree Curriculum 3.1 University Core Requirements 3.2 Four Pillars of IoT 4 Proposed IoT Program Map 4.1 Prerequisites 4.2 Online vs Onsite 5 Other Related Issues 5.1 Potential Jobs 5.2 Tracks or Other Joint Programs 6 Conclusion References IoT in Smart Grid: Energy Management Opportunities and Security Challenges Abstract 1 Introduction 1.1 Background 1.2 Contributions 2 Problem Formulation 2.1 Cost Function 2.2 Constraints 3 Solution Implementation 3.1 Machine Learning Substitution for Optimization Algorithm 3.2 Online Discrepancy Test 4 Conclusion References Author Index