دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: کامپیوتر ویرایش: نویسندگان: Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan سری: Chapman & Hall/CRC Big Data Series ISBN (شابک) : 0367266393, 9780367266394 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: 513 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 7 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Internet of Things and Secure Smart Environments: Successes and Pitfalls به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اینترنت اشیا و محیطهای هوشمند امن: موفقیتها و مشکلات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
هدف اصلی اینترنت اشیا (IoT) ایجاد محیط های هوشمند ایمن، قابل اعتماد و کاملاً خودکار است. با این حال، چالش های تکنولوژیکی زیادی در به کارگیری اینترنت اشیا وجود دارد. این شامل اتصال و شبکه، به موقع بودن، قابلیت اطمینان مصرف برق و انرژی، امنیت و حریم خصوصی، سازگاری و طول عمر، و استانداردهای شبکه/پروتکل است. اینترنت اشیا و محیطهای هوشمند امن: موفقیتها و مشکلات یک نمای کلی از تحقیقات اخیر و مشکلات باز در حوزه تحقیقات اینترنت اشیا ارائه میدهد.
ویژگی ها:
p>
این کتاب مشکلات پیشرفته را پوشش میدهد، راهحلهایی را ارائه میدهد، و مسیرهای تحقیقاتی را برای محققان و محققان در صنعت و دانشگاه باز می کند.
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research.
Features:
This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.
Cover Half Title Series Page Title Page Copyright Page Dedication Table of Contents List of Figures List of Tables Preface Acknowledgement Editors Contributors Chapter 1 Wireless Localization for Smart Indoor Environments 1.1 Introduction 1.2 Positioning Methods 1.2.1 Transmission 1.2.1.1 Time 1.2.1.2 Direction 1.2.1.3 Phase 1.2.2 Characteristics 1.2.2.1 Strength 1.2.2.2 Channel 1.2.3 Critique 1.3 Positioning Technologies 1.3.1 Radio Waves 1.3.2 Sound 1.3.3 Magnetic Field 1.3.4 Visible Light 1.3.5 Vibration 1.3.6 Evaluation Metrics 1.3.7 Critique 1.4 A View for Research Prospects 1.5 Conclusion Note Bibliography Chapter 2 An Approach towards GIS Application in Smart City Urban Planning 2.1 Introduction 2.1.1 Objectives 2.1.2 Contribution 2.1.3 GIS in Urban Planning 2.1.4 GIS as an Integrated System for Smart Cities 2.1.4.1 GIS Applications for Smart Cities 2.1.5 GIS Software Types 2.1.6 GIS Websites 2.2 GIS in Transportation Analysis and Planning 2.2.1 Applications of GIS in Transportation Planning 2.2.2 Internet GIS and Its Applications in Transportation 2.2.3 GIS-T Analysis and Modeling 2.3 GIS in Waste Management Planning 2.3.1 Waste Storage System 2.3.2 Elements of Solid Waste Management 2.3.3 Significance of GIS in Waste Management 2.3.4 GIS for Sustainable Waste Management 2.3.5 GIS Modeling for the Optimization of Waste Collection and Transport 2.3.6 Application of GIS Technology in Waste Management 2.4 Regional Planning 2.5 GIS in Resource Management 2.5.1 The Role of GIS in the Management of Natural Resources 2.5.2 Use of Remote Sensing and GIS in Natural Resource Management 2.5.3 Application of GIS in Natural Resource Management 2.5.3.1 Hazard and Risk Assessment 2.5.3.2 Change Detection 2.5.3.3 Natural Resource Inventory 2.5.3.4 Environmental Monitoring 2.6 GIS in Environmental Monitoring and Assessment 2.6.1 Monitoring Systems in General 2.6.2 Examples of Monitoring Systems 2.6.2.1 Real-Time Monitoring 2.6.2.2 Local Area Monitoring 2.6.3 Role of Remote Sensing and GIS in EIA 2.6.4 Advantages of Using GIS for EIA 2.6.5 Disadvantages in Using GIS for EIA 2.7 GIS in Socio-Economic Development 2.7.1 Methodological Issues of Socio-Economic Data Integration in GIS Applications 2.7.2 Use of GIS by Economic Development Professionals 2.7.3 Advantage of GIS in Economic Development Planning 2.7.4 Disadvantage of GIS in Economic Development Planning 2.8 GIS in Emergency Management 2.8.1 Implementing the Mission with GIS 2.8.2 Emergency Operations Plan 2.9 GIS in Education 2.9.1 Trials and Tribulations of GIS in K-12 Education 2.10 ML in GIS applications 2.11 Cybersecurity in GIS 2.12 Conclusion References Chapter 3 A Review of Checkpointing and Rollback Recovery Protocols for Mobile Distributed Computing Systems 3.1 Introduction 3.2 The System Model 3.3 Background and Definitions 3.4 Checkpointing Techniques 3.4.1 Checkpoint-Based 3.4.1.1 Uncoordinated Checkpointing 3.4.1.2 Coordinated Checkpointing 3.4.1.3 Communication-Induced Checkpointing 3.4.2 Log-Based 3.5 Literature Survey – Early Stage to Current Trend 3.6 Classification of the Protocols 3.7 Conclusions References Chapter 4 Softwarized Network Function Virtualization for 5G: Challenges and Opportunities 4.1 Introduction 4.2 Background 4.2.1 An Overview of SDN 4.2.2 Basic SDN Architecture 4.2.2.1 SDN Control Plane Architecture 4.2.2.2 SDN Application Plane Architecture 4.2.2.3 Operating Principle of SDN 4.2.3 An Overview of NFV 4.2.3.1 Background and Motivation for NFV 4.3 The Relationship of SDN/NFV with 5G 4.3.1 Basic 5G Network Architecture 4.3.1.1 The Core Network Architecture of 5G 4.3.1.2 5G Geographical Architecture Adoption 4.3.2 SDN-/NFV-Enabled 5G Architecture 4.3.3 Fundamental Overview of Network Architecture 4.4 Major Challenges for NFV in 5G 4.5 Opportunities for NFV in 5G 4.6 Conclusion and Future Works Bibliography Chapter 5 An Effective Deployment of SDN Controller in Smart City Renovation 5.1 Introduction 5.1.1 SDN Overview 5.1.2 Satellite Communication 5.2 Background Study 5.2.1 Satellite Communication Using Traditional Network 5.2.2 Satellite Communication Using SDN Framework 5.2.3 Application Deployment of SDN 5.3 Proposed SDN Controller Deployed Design Framework 5.3.1 Data Retrieval 5.3.2 Computation 5.3.3 Verification of Design Constraints 5.3.4 Information Circulation 5.4 NF Virtualization for Energy-Efficient Traffic Dissemination 5.4.1 Network Packet Scheduler 5.4.2 Network Functions 5.5 Mapping of Traffic Control Flow to SDN Virtualization 5.6 Implementation of SDN Deployed Design Framework in Smart City 5.6.1 Experimental Setup 5.6.2 Performance Evaluation 5.6.3 Discussion 5.7 Conclusion References Chapter 6 Flying Ad Hoc Networks: Security, Authentication Protocols, and Future Directions 6.1 Introduction 6.1.1 An Overview of FANET 6.1.1.1 5G- and Blockchain-Enabled FANET 6.1.2 UAV Subsystems 6.1.3 Applications 6.2 Vulnerabilities and Attacks 6.3 Security Requirements in FANET 6.4 Authentication Mechanisms in FANET 6.4.1 Mutual Authentication 6.4.2 User Authentication and Key Agreement Protocols 6.4.3 Drone Authentication 6.4.4 Operator Authentication 6.4.5 Tools and Techniques 6.5 Recent Trends and Future Directions 6.5.1 AI-Enabled Authentication 6.5.1.1 Physical Attribute-Based Authentication 6.5.2 PUF-Based Authentication 6.5.3 Hardware Implementation of Authentication Protocols 6.5.4 Chaos-Based Mutual Authentication 6.5.5 Quantum Authentication 6.5.6 Quantum Chaos Authentication 6.6 Conclusion Bibliography Chapter 7 Investigating Traffic of Smart Speakers and IoT Devices: Security Issues and Privacy Threats 7.1 Introduction 7.2 Smart Speakers: Architecture and Threat Model 7.2.1 Threat Model 7.2.2 Machine Learning Techniques for Attacking the IoT Ecosystem 7.2.2.1 k-Nearest Neighbors (kNN) 7.2.2.2 Decision Tree (DT) 7.2.2.3 Adaptive Boosting – AdaBoost (AB) 7.2.2.4 Random Forest 7.2.2.5 Support Vector Machine (SVM) 7.2.2.6 Neural Networks 7.2.2.7 K-Fold Cross-Validation 7.3 Experimental Test Bed 7.3.1 Data Handling 7.4 Numerical Results 7.4.1 Dataset Overview 7.4.2 Classifying the State of the Smart Speaker 7.4.3 Analysis of the Training Time 7.5 Development of Countermeasures 7.6 Conclusions and Future Works Notes Bibliography Chapter 8 Hardware Security in the Context of Internet of Things: Challenges and Opportunities 8.1 Introduction 8.1.1 Motivational Example 8.1.2 Contributions and Organization of This Chapter 8.2 Threats on IoT Implementation 8.2.1 HTH and Countermeasures 8.2.1.1 Modern Integrated Circuit Design and Manufacturing Practices 8.2.2 HTH Classification Based on Triggering Mechanism 8.2.3 Impact of Undetected HTH Insertion 8.2.3.1 Trojans on IoT Infrastructure 8.2.4 Countermeasures against HTHs 8.2.4.1 HTH Attack Models and Countermeasure Classification 8.2.5 Countermeasures in Malicious Foundry Model 8.2.5.1 Destructive Detection Approaches 8.2.5.2 Non-Destructive Detection Approaches 8.2.5.3 DFT Insertion Approaches 8.2.5.4 Runtime Monitoring Approaches 8.2.5.5 Other Emerging Detection Approaches 8.2.6 Countermeasures in 3PIP Model 8.2.7 Counterfeit ICs 8.2.8 Counterfeit IC Detection 8.2.9 Trends of HTH and Counterfeit Electronics Research 8.3 PUFs for IoT Security 8.3.1 Physically Unclonable Function (PUF) 8.3.1.1 PUF Classification 8.3.2 Attacks on PUFs 8.3.2.1 Modeling Attacks on Delay PUF Variants 8.3.2.2 Cryptanalytic Attacks on Delay PUFs 8.3.3 Attacks on PUF Protocols 8.3.4 Philosophy Behind Modeling Resistant Strong PUF Designs 8.3.5 Application of PUF for IoT Security 8.4 Open Research Issues and Future Research Directions 8.5 Conclusions Bibliography Chapter 9 Security Challenges in Hardware Used for Smart Environments 9.1 Introduction to IoT and Hardware Security Issues 9.1.1 Hardware Issues with Real-Time Examples and Their Countermeasures 9.2 Security Challenges in IoT Devices 9.3 Overview of Hardware Attacks and Threat Models 9.3.1 Hardware Trojans 9.3.2 Hidden Back Door 9.3.3 IP/IC Piracy 9.3.4 IC Overproduction & Cloning 9.3.5 Reverse Engineering 9.4 Security Challenges of Hardware Trojans at IoT Devices 9.5 Countermeasures against Hardware Trojan 9.5.1 Trojan Detection and Diagnosis 9.5.2 Online-Monitoring HT Detection 9.5.3 Trojan Prevention 9.6 Conclusion Bibliography Chapter 10 Blockchain for Internet of Battlefield Things: A Performance and Feasibility Study 10.1 Introduction 10.2 Challenges of IoBT: An Overview 10.2.1 Security and Trustworthiness 10.2.2 Communication 10.2.3 Node Location 10.3 Related Works 10.4 Blockchain Use Cases for Tactical Networks 10.4.1 Permission-Less Variants 10.4.2 Permissioned Variants 10.5 Evaluation 10.5.1 Setup 10.5.2 Substituting Unlimited Term 10.5.3 Network Maintenance 10.5.4 Data Throughput 10.5.4.1 Topology 10.5.4.2 Bandwidth 10.5.5 Successfully Validated Transactions 10.5.5.1 100 Mbps Bandwidth 10.5.5.2 64 Kbps Bandwidth 10.5.6 Edge-Based Simulation 10.5.7 Findings 10.5.8 Other Factors 10.6 Conclusion Bibliography Chapter 11 Internet of Things in 5G Cellular Networks: Radio Resource Perspective 11.1 Introduction 11.2 Narrow Band and Codec Scheme for IoT-enabled 5G 11.2.1 Narrow-Band IoT 11.2.2 Adaptive Modulation and Codec Schemes 11.3 Capacity Estimation of 5G Networks 11.3.1 Resource Allocation Procedure 11.3.2 Theoretical Capacity Analysis of Cellular 5G Networks 11.3.3 Traffic Model of Tasks 11.3.4 Estimation of Task Blocking Performances Based on M/M/m/m Model 11.4 Performance Study 11.4.1 Performance Values 11.4.2 Obtained Results and Discussions 11.5 Conclusion Bibliography Chapter 12 An SDN-IoT–Based Framework for Future Smart Cities: Addressing Perspective 12.1 Introduction 12.2 Background 12.2.1 An Overview of SDN 12.2.2 An Overview of IoT and Smart Cities 12.2.3 An Overview of IPv6 Addressing 12.3 Related Works 12.4 The Proposed SDN-IoT–Based Smart City Framework 12.4.1 The Proposed Addressing Scheme 12.4.2 Performance Evaluation 12.5 Conclusion Bibliography Index