دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: P Kaliraj (editor). T. Devi (editor)
سری:
ISBN (شابک) : 1032008105, 9781032008103
ناشر: Auerbach Publications
سال نشر: 2021
تعداد صفحات: 351
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 20 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Securing IoT in Industry 4.0 Applications with Blockchain به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ایمن سازی اینترنت اشیا در کاربردهای صنعت 4.0 با بلاک چین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
انقلاب Industry 4.0 در حال تغییر جهان اطراف ما است. هوش مصنوعی و یادگیری ماشین، اتوماسیون و رباتیک، داده های بزرگ، اینترنت اشیا، واقعیت افزوده، واقعیت مجازی و خلاقیت ابزارهای Industry 4.0 هستند. همکاری بهبود یافته بین سیستمهای هوشمند و انسانها مشاهده میشود که تواناییهای تفکر انتقادی و شناختی انسانها را با اتوماسیون صنعتی بسیار دقیق و سریع ادغام میکند.
ایمن کردن اینترنت اشیاء در صنعت 4.0 برنامههای کاربردی با بلاک چین نقش اینترنت اشیا را در صنعت 4.0 بررسی میکند. و چگونه می توان آن را از طریق فناوری های مختلف از جمله بلاک چین ایمن کرد. این کتاب با نگاهی عمیق به اینترنت اشیا آغاز میشود و کاربردها، معماری، فناوریها، ابزارها و زبانهای برنامهنویسی را مورد بحث قرار میدهد. سپس به بررسی بلاک چین و امنیت سایبری و همچنین چگونگی دستیابی بلاک چین به امنیت سایبری می پردازد. همچنین به جرایم سایبری و اقدامات پیشگیرانه آنها و مسائل مربوط به امنیت و اعتماد اینترنت اشیا نگاه میکند.
ویژگیها
The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved collaboration is seen between smart systems and humans, which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation.
Securing IoT in Industry 4.0 Applications with Blockchain examines the role of IoT in Industry 4.0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications, architecture, technologies, tools, and programming languages. It then examines blockchain and cybersecurity, as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust.
Features
Cover Half Title Title Page Copyright Page Contents Preface Acknowledgments Editors Contributors Chapter 1. Internet of Things 1.1 Introduction 1.1.1 Evolution of IoT 1.1.2 Definition and Characteristics 1.2 Architecture of IoT 1.2.1 Physical Devices 1.2.2 Gateways and Networks 1.2.3 Edge Analytics 1.2.4 Fog Computing 1.2.5 Cloud Platforms 1.2.6 IoT Data Analytics 1.2.7 IoT Data Visualization 1.3 Technologies for IoT 1.3.1 Communication Protocols 1.3.2 Wireless Sensor Networks 1.3.3 Cloud Computing 1.3.4 Embedded Systems 1.4 Developing IoT Applications 1.4.1 Programming Languages for IoT Devices 1.4.2 Integrated Development Environments (IDEs) for IoT Development 1.4.3 Tools for IoT Development 1.5 Applications of IoT 1.5.1 Agriculture 1.5.2 Smart Cities 1.5.3 Transportation 1.5.4 Environment 1.5.5 Healthcare 1.6 Industrial IoT (IIoT) 1.7 Security in IoT 1.8 Summary Acknowledgment References Chapter 2. IoT Application in Education 2.1 Introduction 2.1.1 Technology Related to Higher Education 2.2 Components of IoT 2.3 IoT Applications in the Teaching and Learning Processes 2.3.1 Interactive Whiteboards 2.3.2 Students ID Cards 2.3.3 Tracking Attendance 2.3.3.1 Sensors and Actuators 2.3.3.2 Connectivity 2.3.3.3 People and Process 2.4 Challenges in IoT 2.4.1 Cloud Computing 2.4.2 Instructional Technologies 2.4.3 Mobility Applications 2.4.4 Security and Privacy 2.4.5 Research Computing 2.4.6 Quality and Ethics 2.4.7 Financing 2.4.8 Network Devices and Connections 2.4.9 Sensors 2.4.9.1 Image Sensors 2.4.10 Physical Objects 2.5 Digital Transformation among the Knowledge Seekers 2.5.1 Content Preparation 2.5.2 Assignments/Seminars/Projects 2.6 Conclusion References Chapter 3. Industrial Internet of Things (IIoT) and Smart Industries 3.1 Industrial Internet of Things (IIoT) 3.1.1 Digital Transformation 3.1.2 Industry 4.0 3.2 IoT Is Making a Smart City 3.3 IIoT in Different Industries 3.3.1 Smart Grid Technology 3.3.2 Smart E-Waste Management 3.3.3 Smart Home 3.3.4 Smart Apartments/Offices/Buildings 3.3.5 Hospital Industry 3.3.6 Water Industry 3.3.7 Oil and Gas Industry 3.3.8 Transport Engineering Industry 3.3.9 Mining Industry 3.3.10 Smart Drones 3.3.11 IoT in Business/Retail Shopping 3.3.12 IoT in Ocean Exploration 3.3.13 Agriculture Industry 3.3.14 Food Industry 3.3.15 IoT in the Fire Industry 3.4 Conclusion References Chapter 4. Medical Internet of Health Things (mIoT) 4.1 Medical IoT 4.1.1 Advantage of Medical IoT 4.2 General Architecture of IoT 4.2.1 Devices 4.2.2 Data Aggregation and Preprocessing 4.2.3 Data Storage 4.2.4 Data Analysis 4.3 Internet of Mobile Health Things (mIoT) 4.3.1 mIoT Layer for Patient Monitoring 4.3.2 Wearable Medical Devices 4.3.3 Wearable Medical Rehabilitation Devices 4.4 Conclusion References Chapter 5. Industrial Internet of Things (IIoT) Applications 5.1 Evolution of IoT for Industrial Applications 5.2 Market Share and Growth Projection of IIoT 5.3 IIoT and Impacts by Industry 5.3.1 Retail 5.3.2 Manufacturing 5.3.3 Telecom 5.3.4 Energy and Utilities 5.3.5 Life Sciences 5.3.6 Banking and Financial Services 5.4 Insurance and Healthcare 5.4.1 Lines of Businesses in Insurance 5.4.2 Value Chains in Insurance 5.5 Anatomy of an IoT User Journey in Insurance 5.6 IIoT in Healthcare During COVID-19 5.7 Fusion of IR 4.0 Technologies 5.8 IIoT Implementation Examples in Insurance 5.9 Challenges and Opportunities 5.10 Crystal Gazing into the Future 5.11 IIoT Learning Road Map for Education References Chapter 6. Smart Farming: IoT-Based Plant Leaf Disease Detection and Prediction Using Image Processing Techniques 6.1 Introduction 6.2 Smart Farming and Benefits 6.3 Smart Farming Components 6.4 Smart Farming Application Areas 6.4.1 Precision Farming 6.4.2 Agricultural Drones 6.4.3 Livestock Management 6.4.4 Smart Greenhouse 6.5 Smart Farming in Industries 6.5.1 Robotics 6.5.2 Remote Sensing 6.5.3 Computer Imaging 6.6 Service Providers of Smart Farming 6.6.1 Mothive 6.6.2 CropX 6.6.3 Arable 6.6.4 Ceres Imaging 6.6.5 Gamaya 6.6.6 AgriData 6.6.7 Agrowatcher 6.6.8 AgEagle 6.6.9 PrecisionHawk 6.6.10 Aker Technologies 6.7 Conclusion References Chapter 7. Artificial Intelligence and Internet of Things: The Smart City Perspective 7.1 Introduction 7.1.1 Artificial Intelligence 7.1.2 Internet of Things 7.2 Convergence of AI and IoT 7.3 Need for AI-Enabled IoT 7.4 Application Domains of AI-Enabled IoT 7.5 Smart City Environment 7.5.1 Smart City Initiatives Worldwide 7.5.2 Smart City Initiatives in India 7.6 AI-Enabled IoT in Smart City Development 7.6.1 Smart Environment 7.6.1.1 AI and IoT in Air Quality 7.6.1.2 AI and IoT in Water Quality 7.6.1.3 AI and IoT in Renewable Energy Production 7.6.2 Smart Healthcare 7.6.3 Smart Agriculture 7.6.4 Smart Buildings 7.6.5 Smart Manufacturing 7.6.6 Smart Transportation 7.6.7 Smart Waste Management 7.7 Case Study: Coimbatore City 7.7.1 Smart City Architecture for Coimbatore City 7.8 Summary References Chapter 8. Internet of Nano Things: An Amalgamation of Nanotechnology and IoT 8.1 Introduction 8.1.1 Internet of Things: Making Things Smarter 8.1.2 Internet of Nano Things: Making Smarter Things Smaller 8.2 Nanotechnology and Nanomaterials 8.2.1 Processing Nanomaterials for IoNT Applications 8.2.2 Roles of Nanomaterials in IoNT 8.3 Nanomachines 8.3.1 Architecture of Nanomachines 8.3.2 Development of Nanomachines 8.4 Communication and Networking of IoNT 8.4.1 Nano-Communication Paradigms 8.4.2 IoNT Network Architecture 8.5 Applications of IoNT 8.5.1 Illustration of IoNT Working: Wearable Biosensors 8.5.2 Other Application 8.5.2.1 Internet of Bio-Nano Things (IoBNT) and Biomedical Applications 8.5.2.2 Industrial Applications 8.5.2.3 Environmental Applications 8.5.2.4 Military and Spacespace Applications 8.6 Challenges of IoNT 8.7 Conclusion References Chapter 9. Blockchain and Cybersecurity 9.1 Introduction to Blockchain 9.2 Cryptographic Hash Functions 9.2.1 Uses of Hash Functions 9.2.1.1 Integrity of Data 9.2.1.2 Protecting Passwords 9.2.1.3 Proof-of-Work 9.3 Hash Functions in a Blockchain 9.3.1 Blockchain in Bitcoin Network 9.3.2 Private Blockchain 9.4 Advantages of Blockchains 9.5 Disadvantages of Blockchains 9.5.1 51% Attack 9.5.2 Examples of 51% Attacks 9.6 Blockchains and Cybersecurity 9.6.1 Cryptocurrency 9.6.2 Smart Contracts 9.6.3 Transferring Financial Instruments: Uses in Stock Exchanges 9.6.4 Namecoin: Distributed DNS 9.6.5 Public Key Infrastructure: Playing the Role of Certificate Authorities 9.6.6 Anonymizing Data: Uses in the Healthcare Industry 9.6.7 Blockchains as Repositories of Public Registers 9.6.8 IoT and Blockchain 9.6.9 Traceability and Supply Chain Management 9.6.10 Public Register of Antiques and Artefacts 9.7 Conclusion References Chapter 10. Blockchain 10.1 Introduction to Blockchain 10.1.1 What Is Blockchain? 10.1.2 Origin of Blockchain 10.1.2.1 Demerits of the Current Transaction System 10.2 Blockchain Mechanism 10.2.1 Components of a Blockchain 10.3 Types of Blockchain 10.3.1 Public Blockchain 10.3.2 Private Blockchain 10.3.3 Consortium Blockchain 10.3.4 Hybrid Blockchain 10.4 Evolution of Blockchains 10.4.1 Smart Contract 10.5 Business Applications of Blockchain 10.5.1 Manufacturing 10.5.2 Healthcare 10.5.3 Supply Chains 10.5.3.1 Drug Supply in Healthcare 10.5.3.2 Documentation and Verification 10.5.3.3 Trade Financing in NBFCs 10.5.3.4 Agriculture Financing 10.5.4 Education and Academia 10.5.5 Crowdfunding 10.5.6 Banking 10.5.7 Cryptocurrency 10.6 Benefits of Blockchain Technology 10.7 Infrastructure Needed to Implement Blockchain 10.8 Conclusion References Chapter 11. Cybersecurity 11.1 Cybercrime: An Overview 11.1.1 Growth of Internet 11.1.2 Evaluation of Data 11.1.3 Causes of Cybercrime 11.1.4 Classifications of Cyber Vulnerabilities 11.1.4.1 Individuals 11.1.4.2 Organization 11.1.4.3 Society 11.1.4.4 Government 11.1.5 Classifications of Malware Attacks 11.2 Cybersecurity Techniques 11.2.1 Authentication 11.2.2 Encryption 11.2.2.1 Encryption Algorithm 11.2.3 Digital Signatures 11.2.3.1 Digital Signature Algorithm (DSA) 11.2.4 Antivirus 11.2.5 Firewall 11.2.5.1 Functions of Firewalls 11.2.6 Steganography 11.3 Preventive Measures 11.3.1 Generating Secure Passwords 11.3.2 Two-Factor Authentications 11.3.3 Using Password Manager 11.3.3.1 Functions of Password Managers 11.3.3.2 The Functionality of KeePassX Password Manager 11.3.3.3 Features of Password Managers 11.4 Cybercrime Initiatives in India 11.4.1 Ministry of Home Affairs (MHA) 11.4.2 National Crime Records Bureau (NCRB) 11.4.3 Computer Emergency Response Team - (CERT-In) 11.4.4 National Counter Terrorism Center (NCTC) 11.4.5 Indian Penal Code (IPC) 11.4.6 National Critical Information Infrastructure Protection Center (NCIIPC) of India 11.5 Cybersecurity Tools 11.5.1 IBM QRadar Advisor and Watson 11.5.2 Kali Linux 11.5.3 Netstumbler 11.5.4 Splunk 11.5.5 Nmap References Chapter 12. PLC and SCADA as Smart Services in Industry 4.0 for Industrial Automation Techniques 12.1 Introduction 12.2 Classifications of Automation Systems 12.2.1 Fixed Automation 12.2.2 Programmable Automation 12.2.3 Flexible Automation 12.2.4 Integrated Automation 12.3 Industrial Automation Systems 12.3.1 Manufacturing Automation System 12.3.2 Process Plant Automation System 12.3.3 The Functional Elements of Industrial Automation 12.3.3.1 Sensing and Actuating Elements 12.3.4 Industrial Sensors and Instrument Systems 12.3.4.1 Physical Medium 12.3.4.2 Sensing Element 12.3.4.3 Signal-Conditioning Elements 12.3.4.4 Signal Processing Elements 12.3.4.5 Target Signal-Handling 12.3.5 Industrial Actuator Systems 12.3.5.1 Electronic Signal-Processing Elements 12.3.5.2 Electronic Power Amplification Elements 12.3.5.3 Variable Conversion Elements 12.3.5.4 Non-Electrical Power Conversion Element 12.3.5.5 Non-Electrical Variable Conversion Element 12.4 Programmable Logic Controller (PLC) 12.4.1 PLC's Evolution 12.4.2 Application Areas 12.4.3 Central Processing Units 12.4.4 Communications Processors 12.4.5 Program and Data Memory 12.4.6 Programmers 12.5 Supervisory Control and Data Acquisition (SCADA) 12.5.1 Implementation of PLC and SCADA in Industrial Application 12.5.1.1 Automated Effective Boiler System for Thermal Power Plant Using PLC and SCADA 12.5.1.2 Necessity for Automated Boiler 12.5.1.3 Boiler Automation Using PLC and SCADA 12.5.2 Control Parameters 12.5.3 SCADA Design 12.5.4 Internet of Things (IoT) 12.6 Conclusion References Index