ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internet of Things and Secure Smart Environments: Successes and Pitfalls

دانلود کتاب اینترنت اشیا و محیط‌های هوشمند امن: موفقیت‌ها و مشکلات

Internet of Things and Secure Smart Environments: Successes and Pitfalls

مشخصات کتاب

Internet of Things and Secure Smart Environments: Successes and Pitfalls

دسته بندی: کامپیوتر
ویرایش:  
نویسندگان: , , ,   
سری: Chapman & Hall/CRC Big Data Series 
ISBN (شابک) : 0367266393, 9780367266394 
ناشر: CRC Press 
سال نشر: 2020 
تعداد صفحات: 513 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 مگابایت 

قیمت کتاب (تومان) : 39,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Internet of Things and Secure Smart Environments: Successes and Pitfalls به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا و محیط‌های هوشمند امن: موفقیت‌ها و مشکلات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا و محیط‌های هوشمند امن: موفقیت‌ها و مشکلات



هدف اصلی اینترنت اشیا (IoT) ایجاد محیط های هوشمند ایمن، قابل اعتماد و کاملاً خودکار است. با این حال، چالش های تکنولوژیکی زیادی در به کارگیری اینترنت اشیا وجود دارد. این شامل اتصال و شبکه، به موقع بودن، قابلیت اطمینان مصرف برق و انرژی، امنیت و حریم خصوصی، سازگاری و طول عمر، و استانداردهای شبکه/پروتکل است. اینترنت اشیا و محیط‌های هوشمند امن: موفقیت‌ها و مشکلات یک نمای کلی از تحقیقات اخیر و مشکلات باز در حوزه تحقیقات اینترنت اشیا ارائه می‌دهد.

ویژگی ها:

  • موضوعات و تحقیقات پیشرفته در اینترنت اشیا را ارائه می دهد
  • p>

  • شامل مشارکت‌های محققان برجسته در سراسر جهان است
  • تمرکز بر معماری‌های اینترنت اشیا برای محیط‌های هوشمند
  • امنیت، حریم خصوصی و اعتماد را بررسی می‌کند
  • حرکت و مدیریت داده‌ها (انباشت، انتزاع، ذخیره‌سازی، پردازش، رمزگذاری، بازیابی سریع، امنیت و حریم خصوصی) در اینترنت اشیا برای محیط‌های هوشمند

این کتاب مشکلات پیشرفته را پوشش می‌دهد، راه‌حل‌هایی را ارائه می‌دهد، و مسیرهای تحقیقاتی را برای محققان و محققان در صنعت و دانشگاه باز می کند.


توضیحاتی درمورد کتاب به خارجی

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research.

Features:

  • Presents cutting edge topics and research in IoT
  • Includes contributions from leading worldwide researchers
  • Focuses on IoT architectures for smart environments
  • Explores security, privacy, and trust
  • Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments

This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
List of Figures
List of Tables
Preface
Acknowledgement
Editors
Contributors
Chapter 1 Wireless Localization for Smart Indoor Environments
	1.1 Introduction
	1.2 Positioning Methods
		1.2.1 Transmission
			1.2.1.1 Time
			1.2.1.2 Direction
			1.2.1.3 Phase
		1.2.2 Characteristics
			1.2.2.1 Strength
			1.2.2.2 Channel
		1.2.3 Critique
	1.3 Positioning Technologies
		1.3.1 Radio Waves
		1.3.2 Sound
		1.3.3 Magnetic Field
		1.3.4 Visible Light
		1.3.5 Vibration
		1.3.6 Evaluation Metrics
		1.3.7 Critique
	1.4 A View for Research Prospects
	1.5 Conclusion
	Note
	Bibliography
Chapter 2 An Approach towards GIS Application in Smart City Urban Planning
	2.1 Introduction
		2.1.1 Objectives
		2.1.2 Contribution
		2.1.3 GIS in Urban Planning
		2.1.4 GIS as an Integrated System for Smart Cities
			2.1.4.1 GIS Applications for Smart Cities
		2.1.5 GIS Software Types
		2.1.6 GIS Websites
	2.2 GIS in Transportation Analysis and Planning
		2.2.1 Applications of GIS in Transportation Planning
		2.2.2 Internet GIS and Its Applications in Transportation
		2.2.3 GIS-T Analysis and Modeling
	2.3 GIS in Waste Management Planning
		2.3.1 Waste Storage System
		2.3.2 Elements of Solid Waste Management
		2.3.3 Significance of GIS in Waste Management
		2.3.4 GIS for Sustainable Waste Management
		2.3.5 GIS Modeling for the Optimization of Waste Collection and Transport
		2.3.6 Application of GIS Technology in Waste Management
	2.4 Regional Planning
	2.5 GIS in Resource Management
		2.5.1 The Role of GIS in the Management of Natural Resources
		2.5.2 Use of Remote Sensing and GIS in Natural Resource Management
		2.5.3 Application of GIS in Natural Resource Management
			2.5.3.1 Hazard and Risk Assessment
			2.5.3.2 Change Detection
			2.5.3.3 Natural Resource Inventory
			2.5.3.4 Environmental Monitoring
	2.6 GIS in Environmental Monitoring and Assessment
		2.6.1 Monitoring Systems in General
		2.6.2 Examples of Monitoring Systems
			2.6.2.1 Real-Time Monitoring
			2.6.2.2 Local Area Monitoring
		2.6.3 Role of Remote Sensing and GIS in EIA
		2.6.4 Advantages of Using GIS for EIA
		2.6.5 Disadvantages in Using GIS for EIA
	2.7 GIS in Socio-Economic Development
		2.7.1 Methodological Issues of Socio-Economic Data Integration in GIS Applications
		2.7.2 Use of GIS by Economic Development Professionals
		2.7.3 Advantage of GIS in Economic Development Planning
		2.7.4 Disadvantage of GIS in Economic Development Planning
	2.8 GIS in Emergency Management
		2.8.1 Implementing the Mission with GIS
		2.8.2 Emergency Operations Plan
	2.9 GIS in Education
		2.9.1 Trials and Tribulations of GIS in K-12 Education
	2.10 ML in GIS applications
	2.11 Cybersecurity in GIS
	2.12 Conclusion
	References
Chapter 3 A Review of Checkpointing and Rollback Recovery Protocols for Mobile Distributed Computing Systems
	3.1 Introduction
	3.2 The System Model
	3.3 Background and Definitions
	3.4 Checkpointing Techniques
		3.4.1 Checkpoint-Based
			3.4.1.1 Uncoordinated Checkpointing
			3.4.1.2 Coordinated Checkpointing
			3.4.1.3 Communication-Induced Checkpointing
		3.4.2 Log-Based
	3.5 Literature Survey – Early Stage to Current Trend
	3.6 Classification of the Protocols
	3.7 Conclusions
	References
Chapter 4 Softwarized Network Function Virtualization for 5G: Challenges and Opportunities
	4.1 Introduction
	4.2 Background
		4.2.1 An Overview of SDN
		4.2.2 Basic SDN Architecture
			4.2.2.1 SDN Control Plane Architecture
			4.2.2.2 SDN Application Plane Architecture
			4.2.2.3 Operating Principle of SDN
		4.2.3 An Overview of NFV
			4.2.3.1 Background and Motivation for NFV
	4.3 The Relationship of SDN/NFV with 5G
		4.3.1 Basic 5G Network Architecture
			4.3.1.1 The Core Network Architecture of 5G
			4.3.1.2 5G Geographical Architecture Adoption
		4.3.2 SDN-/NFV-Enabled 5G Architecture
		4.3.3 Fundamental Overview of Network Architecture
	4.4 Major Challenges for NFV in 5G
	4.5 Opportunities for NFV in 5G
	4.6 Conclusion and Future Works
	Bibliography
Chapter 5 An Effective Deployment of SDN Controller in Smart City Renovation
	5.1 Introduction
		5.1.1 SDN Overview
		5.1.2 Satellite Communication
	5.2 Background Study
		5.2.1 Satellite Communication Using Traditional Network
		5.2.2 Satellite Communication Using SDN Framework
		5.2.3 Application Deployment of SDN
	5.3 Proposed SDN Controller Deployed Design Framework
		5.3.1 Data Retrieval
		5.3.2 Computation
		5.3.3 Verification of Design Constraints
		5.3.4 Information Circulation
	5.4 NF Virtualization for Energy-Efficient Traffic Dissemination
		5.4.1 Network Packet Scheduler
		5.4.2 Network Functions
	5.5 Mapping of Traffic Control Flow to SDN Virtualization
	5.6 Implementation of SDN Deployed Design Framework in Smart City
		5.6.1 Experimental Setup
		5.6.2 Performance Evaluation
		5.6.3 Discussion
	5.7 Conclusion
	References
Chapter 6 Flying Ad Hoc Networks: Security, Authentication Protocols, and Future Directions
	6.1 Introduction
		6.1.1 An Overview of FANET
			6.1.1.1 5G- and Blockchain-Enabled FANET
		6.1.2 UAV Subsystems
		6.1.3 Applications
	6.2 Vulnerabilities and Attacks
	6.3 Security Requirements in FANET
	6.4 Authentication Mechanisms in FANET
		6.4.1 Mutual Authentication
		6.4.2 User Authentication and Key Agreement Protocols
		6.4.3 Drone Authentication
		6.4.4 Operator Authentication
		6.4.5 Tools and Techniques
	6.5 Recent Trends and Future Directions
		6.5.1 AI-Enabled Authentication
			6.5.1.1 Physical Attribute-Based Authentication
		6.5.2 PUF-Based Authentication
		6.5.3 Hardware Implementation of Authentication Protocols
		6.5.4 Chaos-Based Mutual Authentication
		6.5.5 Quantum Authentication
		6.5.6 Quantum Chaos Authentication
	6.6 Conclusion
	Bibliography
Chapter 7 Investigating Traffic of Smart Speakers and IoT Devices: Security Issues and Privacy Threats
	7.1 Introduction
	7.2 Smart Speakers: Architecture and Threat Model
	7.2.1 Threat Model
	7.2.2 Machine Learning Techniques for Attacking the IoT Ecosystem
		7.2.2.1 k-Nearest Neighbors (kNN)
		7.2.2.2 Decision Tree (DT)
		7.2.2.3 Adaptive Boosting – AdaBoost (AB)
		7.2.2.4 Random Forest
		7.2.2.5 Support Vector Machine (SVM)
		7.2.2.6 Neural Networks
		7.2.2.7 K-Fold Cross-Validation
	7.3 Experimental Test Bed
		7.3.1 Data Handling
	7.4 Numerical Results
		7.4.1 Dataset Overview
		7.4.2 Classifying the State of the Smart Speaker
		7.4.3 Analysis of the Training Time
	7.5 Development of Countermeasures
	7.6 Conclusions and Future Works
	Notes
	Bibliography
Chapter 8 Hardware Security in the Context of Internet of Things: Challenges and Opportunities
	8.1 Introduction
		8.1.1 Motivational Example
		8.1.2 Contributions and Organization of This Chapter
	8.2 Threats on IoT Implementation
		8.2.1 HTH and Countermeasures
			8.2.1.1 Modern Integrated Circuit Design and Manufacturing Practices
		8.2.2 HTH Classification Based on Triggering Mechanism
		8.2.3 Impact of Undetected HTH Insertion
			8.2.3.1 Trojans on IoT Infrastructure
		8.2.4 Countermeasures against HTHs
			8.2.4.1 HTH Attack Models and Countermeasure Classification
		8.2.5 Countermeasures in Malicious Foundry Model
			8.2.5.1 Destructive Detection Approaches
			8.2.5.2 Non-Destructive Detection Approaches
			8.2.5.3 DFT Insertion Approaches
			8.2.5.4 Runtime Monitoring Approaches
			8.2.5.5 Other Emerging Detection Approaches
		8.2.6 Countermeasures in 3PIP Model
		8.2.7 Counterfeit ICs
		8.2.8 Counterfeit IC Detection
		8.2.9 Trends of HTH and Counterfeit Electronics Research
	8.3 PUFs for IoT Security
		8.3.1 Physically Unclonable Function (PUF)
			8.3.1.1 PUF Classification
		8.3.2 Attacks on PUFs
			8.3.2.1 Modeling Attacks on Delay PUF Variants
			8.3.2.2 Cryptanalytic Attacks on Delay PUFs
		8.3.3 Attacks on PUF Protocols
		8.3.4 Philosophy Behind Modeling Resistant Strong PUF Designs
		8.3.5 Application of PUF for IoT Security
	8.4 Open Research Issues and Future Research Directions
	8.5 Conclusions
	Bibliography
Chapter 9 Security Challenges in Hardware Used for Smart Environments
	9.1 Introduction to IoT and Hardware Security Issues
		9.1.1 Hardware Issues with Real-Time Examples and Their Countermeasures
	9.2 Security Challenges in IoT Devices
	9.3 Overview of Hardware Attacks and Threat Models
		9.3.1 Hardware Trojans
		9.3.2 Hidden Back Door
		9.3.3 IP/IC Piracy
		9.3.4 IC Overproduction & Cloning
		9.3.5 Reverse Engineering
	9.4 Security Challenges of Hardware Trojans at IoT Devices
	9.5 Countermeasures against Hardware Trojan
		9.5.1 Trojan Detection and Diagnosis
		9.5.2 Online-Monitoring HT Detection
		9.5.3 Trojan Prevention
	9.6 Conclusion
	Bibliography
Chapter 10 Blockchain for Internet of Battlefield Things: A Performance and Feasibility Study
	10.1 Introduction
	10.2 Challenges of IoBT: An Overview
		10.2.1 Security and Trustworthiness
		10.2.2 Communication
		10.2.3 Node Location
	10.3 Related Works
	10.4 Blockchain Use Cases for Tactical Networks
		10.4.1 Permission-Less Variants
		10.4.2 Permissioned Variants
	10.5 Evaluation
		10.5.1 Setup
		10.5.2 Substituting Unlimited Term
		10.5.3 Network Maintenance
		10.5.4 Data Throughput
			10.5.4.1 Topology
			10.5.4.2 Bandwidth
		10.5.5 Successfully Validated Transactions
			10.5.5.1 100 Mbps Bandwidth
			10.5.5.2 64 Kbps Bandwidth
		10.5.6 Edge-Based Simulation
		10.5.7 Findings
		10.5.8 Other Factors
	10.6 Conclusion
	Bibliography
Chapter 11 Internet of Things in 5G Cellular Networks: Radio Resource Perspective
	11.1 Introduction
	11.2 Narrow Band and Codec Scheme for IoT-enabled 5G
		11.2.1 Narrow-Band IoT
		11.2.2 Adaptive Modulation and Codec Schemes
	11.3 Capacity Estimation of 5G Networks
		11.3.1 Resource Allocation Procedure
		11.3.2 Theoretical Capacity Analysis of Cellular 5G Networks
		11.3.3 Traffic Model of Tasks
		11.3.4 Estimation of Task Blocking Performances Based on M/M/m/m Model
	11.4 Performance Study
		11.4.1 Performance Values
		11.4.2 Obtained Results and Discussions
	11.5 Conclusion
	Bibliography
Chapter 12 An SDN-IoT–Based Framework for Future Smart Cities: Addressing Perspective
	12.1 Introduction
	12.2 Background
		12.2.1 An Overview of SDN
		12.2.2 An Overview of IoT and Smart Cities
		12.2.3 An Overview of IPv6 Addressing
	12.3 Related Works
	12.4 The Proposed SDN-IoT–Based Smart City Framework
		12.4.1 The Proposed Addressing Scheme
		12.4.2 Performance Evaluation
	12.5 Conclusion
	Bibliography
Index




نظرات کاربران