دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Sudhir Kumar Sharma, Bharat Bhushan, Bhuvan Unhelkar سری: Internet of Everything (IoE): Security and Privacy Paradigm ISBN (شابک) : 2020032471, 9781003121664 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: [345] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 11 Mb
در صورت تبدیل فایل کتاب Security and Trust Issues in Internet of Things: Blockchain to the Rescue به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مسائل امنیت و اعتماد در اینترنت اشیا: بلاک چین برای نجات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Editors Contributors Chapter 1 IoT: Fundamentals and Challenges 1.1 Introduction 1.1.1 Motivation of Study/Major Contribution 1.1.2 Definition of IoT 1.2 Origin and Growth of IoT 1.3 Technical Challenges 1.3.1 Heterogeneity and Architecture 1.3.2 Source Management 1.3.3 Effective Information Handling 1.3.4 Privacy and Security 1.4 Nontechnical/Societal Challenges 1.4.1 Environmental Sustainability Challenges 1.5 Future Challenges in IoT 1.5.1 Security Issues 1.5.2 Usability Versus Component Cost 1.5.3 Exchange of Information 1.5.4 Managing Data 1.5.5 Energy Consumption 1.6 Conclusion and Future Work Acknowledgement References Chapter 2 Internet of Things Development in Polish Enterprises 2.1 Introduction 2.2 IoT – Framework 2.3 The External Application of the IoT in a Company Environment 2.3.1 Information Technology 2.3.2 Retail 2.3.3 Transportation and Logistics 2.3.4 Financial Services 2.3.5 Supply Chain 2.3.6 Personal and Social 2.3.7 Energy 2.3.8 Manufacturing 2.3.9 Smart Grid 2.3.10 Healthcare 2.3.11 Smart City 2.3.12 Wearables 2.3.13 Smart Agriculture 2.4 The IoT Internal Application in Enterprises’ Business Operations 2.4.1 Asset Management 2.4.2 Customer Experience 2.4.3 Environment 2.4.4 Finance 2.4.5 Manufacturing 2.4.6 Product Development 2.4.7 Safety 2.4.8 Supply Chain 2.4.9 Warehousing and Logistics 2.5 IoT Challenges, Benefits, and Trends in Development 2.6 Methods 2.6.1 Instrument 2.6.2 Sample and Procedure 2.6.3 Data Analysis 2.7 Results 2.7.1 Sample Demographics 2.7.2 IoT External Application Usage 2.7.3 IoT Internal Application and Services Priority Usage 2.7.4 IoT Benefits 2.8 IoT Utilization and Implementation Challenges 2.9 IoT External and Internal Application Usage – Organization Approach 2.10 IoT Internal Application Usage – Organization Challenges 2.11 Discussion 2.12 Conclusion References Chapter 3 Information Security of Weather Monitoring System with Elements of Internet Things 3.1 Introduction 3.1.1 Contribution 3.1.2 Chapter Structure 3.2 The Concept of Environmental Monitoring 3.3 Hierarchy of Sensor Monitoring Networks 3.4 The Task of Hierarchy Design 3.5 Monitoring System as a Complex System 3.5.1 Functional Components of the System 3.5.2 Environmental Monitoring Objects 3.6 Optimization of Monitoring System Instrumentation 3.7 Synthesis of Topological Architecture 3.8 Software and Hardware Architecture 3.8.1 Functional Components of the System 3.8.2 Physical Components of the Monitoring System 3.9 Blockchain and Security of Monitoring Systems 3.10 Summary and Further Work References Chapter 4 IoT-Enabled Surveillance System to Provide Secured Gait Signatures Using Deep Learning 4.1 Introduction 4.2 Literature Review 4.2.1 Knowledge-Based Authentication 4.2.2 Graphical Authentication Methods 4.2.3 Biometrics 4.2.3.1 Facial-Based Recognition 4.2.3.2 Audio Recognition 4.2.3.3 Minutiae-Based Identification 4.2.3.4 Biometrics Gait Identification 4.3 Proposed Methodology 4.3.1 Dataset 4.3.2 Modules in GAM 4.3.3 User Interface 4.3.4 Background-Based Services 4.4 Modules of a General Authorization Method 4.4.1 Data Capture Module 4.4.2 Signal Processing Module 4.4.3 Data Storage Module 4.4.4 Comparison-Based Module 4.4.5 Decision-Based Module 4.5 Implementation of GAM 4.5.1 Registration Module 4.5.2 Authorization 4.5.3 Preprocessing 4.5.3.1 Feature Extraction 4.5.3.2 Zero Center 4.5.3.3 Segmentation 4.5.4 Classification 4.6 Discussion and Result 4.6.1 K Nearest Neighbor 4.6.2 Hidden Markov Model 4.6.3 Support Vector Machine 4.6.4 Deep Neural Network 4.7 Conclusions and Future Work References Chapter 5 IoT-Based Advanced Neonatal Incubator 5.1 Introduction 5.2 Systems Design 5.2.1 Temperature Control 5.2.2 Humidity Control 5.3 Portable Incubators 5.4 IoT-Based Neonatal Incubators 5.4.1 Attacks in the IoT System 5.4.2 Requirements of IoT Devices 5.5 Proposed Incubator System 5.6 Future Research Trends 5.7 Conclusion References Chapter 6 Malware Threat Analysis of IoT Devices Using Deep Learning Neural Network Methodologies 6.1 Introduction 6.2 Literature Review 6.2.1 Static Analysis 6.2.2 Dynamic Analysis 6.2.3 Hybrid Analysis 6.2.4 Visualization Analysis 6.3 Challenges 6.3.1 Malware Threat Detection 6.3.2 Software Piracy Threat Detection 6.4 Engineered Model 6.4.1 Software Piracy Threat Detection Methodology 6.4.1.1 Data Preprocessing 6.4.1.2 TensorFlow and Keras API – Deep Learning 6.4.2 Malware Threat Detection Methodology 6.4.2.1 Data Preprocessing 6.4.2.2 Deep Convolutional Neural Network 6.4.2.3 Convolution Layer 6.4.2.4 Pooling Layer 6.5 Implementation 6.5.1 Convolutional Neural Network CNN Model Algorithm 6.5.2 Artificial Neural Network (ANN) ANN Model Algorithm 6.6 Result 6.6.1 CNN 6.6.2 ANN 6.7 Conclusion References Chapter 7 Data Encryption for IoT Applications Based on Two-Parameter Fuss–Catalan Numbers 7.1 Introduction 7.2 Related Works 7.3 Preliminaries for the Proposed Method 7.4 Encryption Method Based on Fuss–Catalan Objects and Lattice Path 7.5 Experimental Results 7.6 Conclusion Appendix References Chapter 8 Fog-Based Framework for Improving IoT/ IoV Security and Privacy 8.1 Introduction 8.2 IoV-Enabling Technologies and Architectures 8.2.1 IoV Technologies 8.2.1.1 Sensing Technologies 8.2.1.2 Intravehicle Communication 8.2.1.3 V2X Communication 8.2.2 IoV Architectures 8.2.2.1 Edge– Fog–Cloud Architecture 8.3 IoV Security: Challenges, Threats, and Countermeasures 8.3.1 Formal Methods and IoT Security 8.3.2 IoT and IoV Security Classification 8.3.2.1 Authentication 8.3.2.2 Authorization 8.3.2.3 Confidentiality 8.3.2.4 Integrity 8.3.2.5 Privacy 8.3.2.6 Data Availability 8.3.2.7 Quality of Service ( QoS) 8.3.3 IoV Attacks 8.3.3.1 Denial of Service ( DOS) 8.3.3.2 Sybil Attack 8.3.3.3 GPS Deception 8.3.3.4 Masquerading 8.3.3.5 Eavesdropping 8.3.3.6 Routing Attack 8.3.4 IoV Attacks Countermeasures 8.4 Fog-Based Approach for IoV Security 8.4.1 Related Works 8.4.2 Fog-Based Security Architecture: Overview 8.4.2.1 Fog Node Architecture 8.4.2.2 Edge Node Architecture 8.4.3 InterFog-A Functionalities and Scenarios 8.4.3.1 Establish a Trusted Connection between an Edge Device and Fog Services 8.4.3.2 Establish a Trusted Connection between Edge Devices 8.4.3.3 Handover Mechanism 8.5 Conclusion Acknowledgment References Chapter 9 An Overview of Blockchain and its Applications in the Modern Digital Age 9.1 Introduction 9.2 Blockchain Concepts 9.2.1 Consensus Algorithm 9.2.2 Hash Function 9.3 Blockchain Technologies for Security 9.3.1 Role of the Hash Function in Cryptography 9.3.2 Security as Decentralization 9.3.3 Public and Private Blockchain 9.3.4 Analytical Intelligence 9.3.5 Advantages of Blockchain Security 9.4 Security and Trust Issues in IoT 9.4.1 IoT Security Aspects 9.4.2 IoT Communication Security 9.5 Blockchain and IoT 9.5.1 Blockchain for IoT Security 9.5.2 Blockchain Benefits for IoT Security 9.6 Future Trends 9.7 Conclusions References Chapter 10 Blockchain as a Lifesaver of IoT: Applications, Security, and Privacy Services and Challenges 10.1 Introduction 10.2 History and Evolution of Internet of Things 10.2.1 Elements of Internet of Things 10.2.1.1 Sensors/Gadgets 10.2.1.2 Security 10.2.1.3 Communication 10.2.1.4 Information 10.2.1.5 Network 10.2.1.6 Connectivity 10.2.2 Architecture of Internet of Thing 10.2.2.1 Three-Layered IoT Architecture 10.2.2.2 Five-Layered IoT Architecture 10.2.3 Major Issues of Internet of Things 10.2.3.1 Cloud Attacks 10.2.3.2 Internet Walls 10.2.3.3 Lack of Confidence 10.2.3.4 Privacy 10.2.3.5 Security 10.3 Blockchain as a Solution for IoT 10.4 More about Blockchain 10.4.1 Background of Blockchain 10.4.1.1 Architecture of Blockchain 10.4.1.2 Mining a Block in a Blockchain 10.4.1.3 Fundamental Properties of Blockchain 10.4.2 Privacy or Confidentiality Services of Blockchain 10.4.2.1 Data Privacy and Access Control List 10.4.2.2 Significance of Confidentiality in Existing Applications 10.4.2.3 Conventional Approaches for Privacy of Data 10.4.2.4 Challenges of the Conventional Approaches 10.4.2.5 Data Privacy Approaches Based on Blockchain 10.5 Blockchain-Based Internet of Things 10.5.1 Applications of Blockchain for the IoT 10.5.1.1 Intrusion Detection 10.5.1.2 Disseminated P2P Applications 10.5.1.3 IoT in the Era of 5G 10.5.1.4 Internet of Things Gadgets 10.5.1.5 Crowdsensing Applications 10.5.1.6 Edge Computing 10.5.1.7 Data Storage 10.5.2 Basic Concept of Security and Privacy in IoT Based on Blockchain 10.5.2.1 Trust 10.5.2.2 Certification 10.5.2.3 Preservation of Confidentiality 10.5.3 Challenges of Blockchain 10.5.3.1 Communication Overhead 10.5.3.2 Time Consumption 10.5.3.3 Scalability 10.5.3.4 Anonymity and Confidentiality 10.5.3.5 Computation and Mining Nodes 10.6 Conclusion References Chapter 11 Business Operations and Service Management within Blockchain in the Internet of Things 11.1 Introduction 11.2 Provision and Management of IoT Security 11.2.1 Geopolitical Considerations 11.2.2 IoT Security from an Integrated Service 11.2.2.1 Devices and Management 11.2.2.2 Infrastructure and Management 11.2.2.3 Information Management 11.2.2.4 Service and Operations 11.2.3 IoT Security from Integrated Management 11.2.4 IoT Security from Layered Management 11.3 Operations and Service Management in Security of the IoT 11.3.1 Business in the Security of the IoT 11.3.2 Business Management in Security of the IoT 11.3.2.1 Vulnerability Management 11.3.2.2 Ethics 11.3.2.3 Business Drivers in IoT Security 11.3.2.4 Regulatory and Compliance in IoT Security 11.3.2.5 Audit in IoT Security 11.3.3 Service Management in Security of the IoT 11.3.4 Technical Management in Security of the IoT 11.3.4.1 Network Layer 11.3.4.2 Device Layer 11.3.4.3 Information Layer 11.3.5 Automation within Security for IoT 11.4 Blockchain in the Future Trends of Security in the IoT Security 11.5 Conclusion References Chapter 12 IoT-Based Healthcare: Personalized Health Monitoring Using Machine Learning and Blockchain for Security of Data 12.1 Introduction 12.2 IoT in Healthcare 12.2.1 Some of the Major Advantages of Applying IoT in Medical Sector 12.2.2 Objective of IoT in Healthcare 12.2.3 Methodology for Implementing IoT in Healthcare Devices 12.3 IoT and Machine Learning in Healthcare 12.4 Communication Technology Used in IoT in Healthcare 12.4.1 RFID and NFC 12.4.2 LR-WPAN 12.4.3 Bluetooth 12.4.4 ZigBee 12.4.5 Wireless-Fidelity ( Wi-Fi) 12.4.6 Worldwide Interoperability for Microwave Access ( WiMAX) 12.4.7 Mobile Communications 12.4.8 Wireless Sensor Networks ( WSN) 12.5 IoT Communication Models 12.5.1 Device-to-Device Communication Model 12.5.2 Device-to-Cloud Communications 12.5.3 Device-to-Gateway Model 12.5.4 Backend Data Sharing Model 12.6 Challenges of IoT Application in Healthcare 12.6.1 Data Security in IoT Applications in Healthcare 12.6.2 Blockchain to the Rescue in Healthcare Data Security 12.7 Conclusion References Chapter 13 Blockchain-Based Regenerative E-Voting System 13.1 Introduction 13.2 Literature Survey 13.3 Blockchain-Based Regenerative E-Voting System 13.3.1 Types of Blockchain and Consensus Protocols 13.3.2 Registration Phase 13.3.3 Initiation Phase 13.3.4 Verification Phase 13.3.5 Voting Phase 13.3.6 Election Result Phase 13.4 Use Cases 13.5 Possible Attacks on Blockchain Network 13.6 Results and Discussions 13.7 Conclusion and Future Trends References Chapter 14 Blockchain Application of IoT for Water Industry and Its Security 14.1 Introduction 14.2 Issues and Challenges in IoT 14.2.1 Brief Introduction to IoT 14.2.2 Security Issues and Challenges of IoT 14.2.2.1 General Challenges 14.2.2.2 Centralized Sever 14.2.2.3 Technical Challenges 14.2.2.4 Security Attacks Types 14.2.2.5 Design Issues 14.2.2.6 Blockchain Challenges with IoT 14.3 Issues and Challenges in Intelligent Water Industry Integrated with IoT 14.3.1 Current Issues in Water Management 14.3.1.1 Monitoring Limitations 14.3.1.2 Number of Wells 14.3.1.3 Design Issues 14.3.1.4 Statistics 14.3.2 Is Blockchain the Rescue? 14.3.2.1 Decentralization 14.3.2.2 Immutability 14.3.2.3 Auditability 14.3.2.4 Immutability 14.3.3 Other Salient Features 14.3.3.1 Anonymity 14.3.3.2 Veracity 14.3.3.3 Transparency 14.3.3.4 Trust 14.3.3.5 Turing-Complete 14.3.4 IoT Application for Smart Water Management 14.4 Issues and Challenges in IoT 14.4.1 Synopsis of Blockchain Technology 14.4.2 The Construction of Blockchain 14.4.2.1 Nodes 14.4.2.2 Components 14.4.2.3 Mining Formula 14.4.3 How Blockchain Works? 14.4.3.1 Hash Encryption 14.4.3.2 Electronic Signature 14.4.3.3 Correct Mechanism 14.4.4 Various Types of Blockchain 14.4.4.1 Public ( Bitcoin, Ethereum) 14.4.4.2 Private ( R3, Corda) 14.4.4.3 Consortium ( Monax, Multichain) 14.4.5 Development of Blockchain Technology 14.4.5.1 Development Path 14.4.5.2 Typical Applications 14.4.5.3 Blockchain 1. 0—Cryptocurrencies 14.4.5.4 Blockchain 2.0 14.4.5.5 Blockchain 3.0 14.4.6 The Comparison of Technology 14.4.6.1 Smart Contracts in Blockchain 14.4.6.2 Distributed Autonomous Organization ( DAO) and Centralized Autonomous Organization ( CAO) 14.4.6.3 Ethereum in Blockchain Application with IoT 14.5 Blockchain Application for Water Industry Security 14.5.1 Why Blockchain Has Good Prospects in Application? 14.5.1.1 Water Crisis Is Approaching 14.5.1.2 Smart Water Based on Blockchain Technology Is Urgent 14.5.2 Security Issues and Challenges of Intelligent Water Management 14.5.2.1 Security Standards 14.5.2.2 Data Transmission 14.5.2.3 Protection System 14.5.3 Factors Need to be Considered for Blockchain Applications in Water Industry 14.5.3.1 Record 14.5.3.2 Compliance Reporting/ Audit 14.5.3.3 Data Reconciliation 14.5.3.4 Bond Issuance on Blockchain 14.6 Application Summary 14.6.1 Origin Clear 14.6.2 Civic Ledger 14.6.3 AQUAOSO 14.6.4 Newater Technology Works 14.6.5 A Water Management Partner 14.6.6 Recommendation 14.7 Conclusion and Future Works Acknowledgements References Index