دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: شبکه سازی ویرایش: نویسندگان: Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath سری: Advances in Ubiquitous Sensing Applications for Healthcare ISBN (شابک) : 0128212551, 9780128212554 ناشر: Academic Press سال نشر: 2020 تعداد صفحات: 315 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب Security and Privacy Issues in IoT Devices and Sensor Networks به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مسائل مربوط به امنیت و حریم خصوصی در دستگاه های اینترنت اشیا و شبکه های حسگر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مسائل امنیت و حریم خصوصی در دستگاههای اینترنت اشیا و شبکههای حسگر مسائل مربوط به نقض امنیت در شبکههای اینترنت اشیا و حسگر را بررسی میکند و راهحلهای مختلف را بررسی میکند. این کتاب یک رویکرد دوگانه را دنبال میکند، ابتدا بر مبانی و تئوری پیرامون شبکههای حسگر و امنیت اینترنت اشیا تمرکز میکند. سپس راهحلهای عملی را بررسی میکند که میتوانند برای توسعه امنیت این عناصر پیادهسازی شوند و مطالعات موردی را برای افزایش درک ارائه میکنند. تکنیکهای یادگیری ماشین و همچنین پارادایمهای امنیتی دیگر، مانند فناوریهای امنیت ابری و ارزهای دیجیتال، پوشش داده شدهاند. این کتاب نشان می دهد که چگونه می توان از این تکنیک ها برای شناسایی حملات و آسیب پذیری ها، حفظ حریم خصوصی و افزایش امنیت داده ها استفاده کرد.
این مرجع عمیق برای متخصصان صنعت که با سیستمهای WSN و IoT سر و کار دارند و میخواهند امنیت این سیستمها را افزایش دهند، ایدهآل است. علاوه بر این، محققان، توسعه دهندگان مواد و متخصصان فناوری که با جنبه های مختلف حفظ حریم خصوصی داده ها و ارتقای امنیت سروکار دارند، از اطلاعات جامع کتاب بهره مند خواهند شد.
Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies. The book highlights how these techniques can be applied to identify attacks and vulnerabilities, preserve privacy, and enhance data security.
This in-depth reference is ideal for industry professionals dealing with WSN and IoT systems who want to enhance the security of these systems. Additionally, researchers, material developers and technology specialists dealing with the multifarious aspects of data privacy and security enhancement will benefit from the book's comprehensive information.
Front-Matter_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw Front Matter Copyright_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Network Copyright Contributors_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw Contributors Chapter-1---Wireless-sensor-networks--C_2021_Security-and-Privacy-Issues-in- Wireless sensor networks: Concepts, components, and challenges Introduction Network design objective Technological background Network architecture Classification of WSN WSN communication pattern Protocol stack of WSN Medium access control at data link layer Network layer Routing protocol Transport layer WSN design challenges Comparative analysis of optimized clustering algorithm Cluster formation scenario Optimized clustering strategy Evaluation of clustering methods for optimization Modeling of system Result and analysis Conclusion and future work References Chapter-2---Secure-performance-of-emerging-wi_2021_Security-and-Privacy-Issu Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access Brief history of IoT communications related to multiple access technique Basic fundamentals of NOMA NOMA and application in cooperation network NOMA and cognitive radio-assisted IoT system System model of IoT relying NOMA and CR Outage probability analysis in case of partial relay selection Performance analysis of the first user Outage probability at D2 Improving security at physical layer Validating achievable expressions of outage behavior and secure performance via numerical simulation Conclusion References Chapter-3---Security-and-privacy-in-wireless_2021_Security-and-Privacy-Issue Security and privacy in wireless body sensor networks using lightweight cryptography scheme Introduction Motivation and objective of research Related work Proposed work Sensor communication between the sensor nodes Encryption and decryption Secure communication between sensor head to remote server Secure data access in cloud server Performance analysis Summary References Chapter-4---Impact-of-thermal-effects-on-w_2021_Security-and-Privacy-Issues- Impact of thermal effects on wireless body area networks and routing strategies Introduction Thermal-aware routing protocols Thermal-aware routing algorithm (TARA) Least temperature rise (LTR) Least total route temperature (LTRT) Hotspot preventing routing (HPR) RAIN Thermal-aware shortest hop routing protocol (TSHR) M-ATTEMPT TMQoS RE-ATTEMPT M2E2 multihop routing protocol Thermal aware-localized QoS routing protocol Trust and thermal-aware routing protocol Self-healing thermal-aware RPL routing protocol Multipath ring routing protocol Introduction about the thermal influence on medical WSN Problems faced by recent scenario Thermal influence on human tissue Wireless communication technologies for data transfer in WBAN Sources of energy consumption Specific absorption rate (SAR) Proposed protocol (OPOTRP) OPOTRP functional procedure Initialization stage Relay node selection Assigning priority level for data in sensor node Alternative relay node selection Optimal temperature selection Results and discussion Simulation parameters Variation in temperature at different times Average power consumption Network lifetime analysis Different data priority signal Heating ratio Data delivery delay Conclusion References Chapter-5---Four-way-binary-tree-base_2021_Security-and-Privacy-Issues-in-Io Four-way binary tree-based data gathering model for WSN Introduction Literature survey Network model Energy dissipation radio model Network characteristics Proposed (virtual 4-way full binary tree) structure Setup of the network Working of the proposed scheme Initial phase Active phase Dying phase Flow charts Result analysis Advantages of the proposed scheme Conclusion References Chapter-6---Routing-protocols--Key-security-_2021_Security-and-Privacy-Issue Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks Introduction The security issues, challenges and requirements Network security and requirements Security issues and challenges Classification of attacks Based on the attackers location Based on tempering with data Attacks and countermeasures on different layers Physical-layer attacks Data-link layer attacks Networks layer attacks Transport layer attacks Application layer attacks Multilayer attacks Denial of service (DoS) attacks Survey of security issues, threats and defense mechanisms in IoT Wormhole attack and its counter measure Classification of wormhole attacks Wormhole detecting and avoiding models Proposed solutions and analysis Transmission time-based wormhole detection Route reply by the destination RTT calculations TTWD model TTWD algorithm Route discovery Computation of RTT in TTWD Simulation and experimental evaluation Simulation environment Network simulator parameters Simulation results Simulation-scenario 1 Simulation-scenario 2 Simulation-scenario 3 Simulation-scenario 4 Conclusion and future directions References Chapter-7---Fault-tolerance-of-cluster-based-_2021_Security-and-Privacy-Issu Fault tolerance of cluster-based nodes in IoT sensor networks with periodic mode of operation Introduction Related works Mathematical background and main symbols and definitions Models formulation and solution Model 1. Sensor with diagnostics in active mode Model 2. Sensor with diagnostics in active mode and periodical diagnostics in the sleep mode Numerical example Model 3. Sensors with mix architecture of backup batteries Results and discussions Conclusions References Chapter-8---Lightweight-cryptographic-algorit_2021_Security-and-Privacy-Issu Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks Introduction Methodology Chapter organization Related work Preliminaries Resource constrained environment- internet of things (IoT) Phases of IoT system Architectural layers of IoT Implementation of lightweight block ciphers for IoT applications Lightweight cryptographic primitives Lightweight block ciphers Lightweight stream ciphers Lightweight hash functions Lightweight message authentication codes Proposed methodology Hardware analysis metrics Algorithm of KLEIN lightweight block cipher Pipelined architecture of KLEIN lightweight block cipher Parallel architecture of KLEIN lightweight block cipher Unrolled architecture of KLEIN lightweight block cipher Simulation results Results and discussions Performance comparison of conventional and lightweight cryptographic algorithms for IoT Conclusion References Chapter-9---EELC--Energy-efficient-ligh_2021_Security-and-Privacy-Issues-in- EELC: Energy-efficient lightweight cryptography for IoT networks Introduction-IoTSec Cyberattacks Security challenges in IoT Literature survey Energy-efficient lightweight cryptography (EELC) architecture Energy efficient subkey generation LMGF algorithm Algorithm Mathematical model for MAC Flow of OMGF Hardware requirement Robustness of OMGF Energy efficient encryption Working of EEE Energy efficient decryption Performance evaluation Time complexity analysis Analysis based on energy Security attacks Brute force attack Cryptanalysis Conclusion Further reading Chapter-10---Blockchain-as-a-solution-for-_2021_Security-and-Privacy-Issues- Blockchain as a solution for security attacks in named data networking of things Introduction Security attacks in NDN of things (NDNoT) Cache misappropriation Interest flooding Selfish irruption Data phishing Miscellaneous irruptions Blockchain in NDNoT Blockchain basics Blockchain architecture Key features of design of blockchain Security investigation of NDN blockchain of things AES128 algorithm Types of blockchain The need for using a Blockchain in IoT BIoT applications Existing issues of applications of blockchain IoT Further issues and recommendations of blockchain in IoT Conclusion References Chapter-11---A-novel-privacy-preserving-hea_2021_Security-and-Privacy-Issues A novel privacy-preserving healthcare information sharing platform using blockchain Introduction Literature review Overview of blockchain System model Overview Patient uploading medical data Provider uploading medical data of his/her patient Provider sharing medical data with another provider Provider querying medical data of patient Patient updating access given to provider Analysis Conclusion References Chapter-12---Computational-intelligent-techniq_2021_Security-and-Privacy-Iss Computational intelligent techniques for prediction of environmental attenuation of millimeter waves Introduction Atmosphere Composition of atmosphere Terrestrial and satellite links Attenuation due to gas Attenuation caused by snow Attenuation due to hail Attenuation due to dust Attenuation due to scintillation Cloud attenuation Cloud attenuation model Work done by other researchers Rain attenuation ITU-R model Simple attenuation model García-López method Model proposed by Brazil RAL model Rain attenuation in terrestrial links Implementation results of rain model Issues related to machine learning Conclusion References Chapter-13---The-role-of-IoT-in-smart-cities--C_2021_Security-and-Privacy-Is The role of IoT in smart cities: Challenges of air quality mass sensor technology for sustainable solutions Introduction Background of air quality monitoring sensors in urban environments Regulation-based air quality monitoring Ambient particulate monitoring Ambient gas monitoring IoT-based air quality monitoring MSU and LCS monitoring Crowdsourcing and citizen science Evaluation of regulation- and IoT-based air quality sensor technology Applications of urban air quality data Challenges of air quality monitoring and management in urban environments Lack of spatial variability Environmental challenges Crowdsourcing and citizen science challenges Lack of transparency IoT-based air quality monitoring trial programs Applications, initiatives, and future direction Integration of sensor data and passive crowdsourced data Air quality data application framework Practical applications Strategic applications Legislative application Smart city digital twinning Discussion and findings Conclusion References Index_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Networks Index