ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Security and Trust Issues in Internet of Things: Blockchain to the Rescue

دانلود کتاب مسائل امنیت و اعتماد در اینترنت اشیا: بلاک چین برای نجات

Security and Trust Issues in Internet of Things: Blockchain to the Rescue

مشخصات کتاب

Security and Trust Issues in Internet of Things: Blockchain to the Rescue

ویرایش:  
نویسندگان: , ,   
سری: Internet of Everything (IoE): Security and Privacy Paradigm 
ISBN (شابک) : 2020032471, 9781003121664 
ناشر: CRC Press 
سال نشر: 2020 
تعداد صفحات: [345] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 11 Mb 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Security and Trust Issues in Internet of Things: Blockchain to the Rescue به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مسائل امنیت و اعتماد در اینترنت اشیا: بلاک چین برای نجات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1 IoT: Fundamentals and Challenges
	1.1 Introduction
		1.1.1 Motivation of Study/Major Contribution
		1.1.2 Definition of IoT
	1.2 Origin and Growth of IoT
	1.3 Technical Challenges
		1.3.1 Heterogeneity and Architecture
		1.3.2 Source Management
		1.3.3 Effective Information Handling
		1.3.4 Privacy and Security
	1.4 Nontechnical/Societal Challenges
		1.4.1 Environmental Sustainability Challenges
	1.5 Future Challenges in IoT
		1.5.1 Security Issues
		1.5.2 Usability Versus Component Cost
		1.5.3 Exchange of Information
		1.5.4 Managing Data
		1.5.5 Energy Consumption
	1.6 Conclusion and Future Work
	Acknowledgement
	References
Chapter 2 Internet of Things Development in Polish Enterprises
	2.1 Introduction
	2.2 IoT – Framework
	2.3 The External Application of the IoT in a Company Environment
		2.3.1 Information Technology
		2.3.2 Retail
		2.3.3 Transportation and Logistics
		2.3.4 Financial Services
		2.3.5 Supply Chain
		2.3.6 Personal and Social
		2.3.7 Energy
		2.3.8 Manufacturing
		2.3.9 Smart Grid
		2.3.10 Healthcare
		2.3.11 Smart City
		2.3.12 Wearables
		2.3.13 Smart Agriculture
	2.4 The IoT Internal Application in Enterprises’ Business Operations
		2.4.1 Asset Management
		2.4.2 Customer Experience
		2.4.3 Environment
		2.4.4 Finance
		2.4.5 Manufacturing
		2.4.6 Product Development
		2.4.7 Safety
		2.4.8 Supply Chain
		2.4.9 Warehousing and Logistics
	2.5 IoT Challenges, Benefits, and Trends in Development
	2.6 Methods
		2.6.1 Instrument
		2.6.2 Sample and Procedure
		2.6.3 Data Analysis
	2.7 Results
		2.7.1 Sample Demographics
		2.7.2 IoT External Application Usage
		2.7.3 IoT Internal Application and Services Priority Usage
		2.7.4 IoT Benefits
	2.8 IoT Utilization and Implementation Challenges
	2.9 IoT External and Internal Application Usage – Organization Approach
	2.10 IoT Internal Application Usage – Organization Challenges
	2.11 Discussion
	2.12 Conclusion
	References
Chapter 3 Information Security of Weather Monitoring System with Elements of Internet Things
	3.1 Introduction
		3.1.1 Contribution
		3.1.2 Chapter Structure
	3.2 The Concept of Environmental Monitoring
	3.3 Hierarchy of Sensor Monitoring Networks
	3.4 The Task of Hierarchy Design
	3.5 Monitoring System as a Complex System
		3.5.1 Functional Components of the System
		3.5.2 Environmental Monitoring Objects
	3.6 Optimization of Monitoring System Instrumentation
	3.7 Synthesis of Topological Architecture
	3.8 Software and Hardware Architecture
		3.8.1 Functional Components of the System
		3.8.2 Physical Components of the Monitoring System
	3.9 Blockchain and Security of Monitoring Systems
	3.10 Summary and Further Work
	References
Chapter 4 IoT-Enabled Surveillance System to Provide Secured Gait Signatures Using Deep Learning
	4.1 Introduction
	4.2 Literature Review
		4.2.1 Knowledge-Based Authentication
		4.2.2 Graphical Authentication Methods
		4.2.3 Biometrics
			4.2.3.1 Facial-Based Recognition
			4.2.3.2 Audio Recognition
			4.2.3.3 Minutiae-Based Identification
			4.2.3.4 Biometrics Gait Identification
	4.3 Proposed Methodology
		4.3.1 Dataset
		4.3.2 Modules in GAM
		4.3.3 User Interface
		4.3.4 Background-Based Services
	4.4 Modules of a General Authorization Method
		4.4.1 Data Capture Module
		4.4.2 Signal Processing Module
		4.4.3 Data Storage Module
		4.4.4 Comparison-Based Module
		4.4.5 Decision-Based Module
	4.5 Implementation of GAM
		4.5.1 Registration Module
		4.5.2 Authorization
		4.5.3 Preprocessing
			4.5.3.1 Feature Extraction
			4.5.3.2 Zero Center
			4.5.3.3 Segmentation
		4.5.4 Classification
	4.6 Discussion and Result
		4.6.1 K Nearest Neighbor
		4.6.2 Hidden Markov Model
		4.6.3 Support Vector Machine
		4.6.4 Deep Neural Network
	4.7 Conclusions and Future Work
	References
Chapter 5 IoT-Based Advanced Neonatal Incubator
	5.1 Introduction
	5.2 Systems Design
		5.2.1 Temperature Control
		5.2.2 Humidity Control
	5.3 Portable Incubators
	5.4 IoT-Based Neonatal Incubators
		5.4.1 Attacks in the IoT System
		5.4.2 Requirements of IoT Devices
	5.5 Proposed Incubator System
	5.6 Future Research Trends
	5.7 Conclusion
	References
Chapter 6 Malware Threat Analysis of IoT Devices Using Deep Learning Neural Network Methodologies
	6.1 Introduction
	6.2 Literature Review
		6.2.1 Static Analysis
		6.2.2 Dynamic Analysis
		6.2.3 Hybrid Analysis
		6.2.4 Visualization Analysis
	6.3 Challenges
		6.3.1 Malware Threat Detection
		6.3.2 Software Piracy Threat Detection
	6.4 Engineered Model
		6.4.1 Software Piracy Threat Detection Methodology
			6.4.1.1 Data Preprocessing
			6.4.1.2 TensorFlow and Keras API – Deep Learning
		6.4.2 Malware Threat Detection Methodology
			6.4.2.1 Data Preprocessing
			6.4.2.2 Deep Convolutional Neural Network
			6.4.2.3 Convolution Layer
			6.4.2.4 Pooling Layer
	6.5 Implementation
		6.5.1 Convolutional Neural Network
		CNN Model Algorithm
		6.5.2 Artificial Neural Network (ANN)
		ANN Model Algorithm
	6.6 Result
		6.6.1 CNN
		6.6.2 ANN
	6.7 Conclusion
	References
Chapter 7 Data Encryption for IoT Applications Based on Two-Parameter Fuss–Catalan Numbers
	7.1 Introduction
	7.2 Related Works
	7.3 Preliminaries for the Proposed Method
	7.4 Encryption Method Based on Fuss–Catalan Objects and Lattice Path
	7.5 Experimental Results
	7.6 Conclusion
	Appendix
	References
Chapter 8 Fog-Based Framework for Improving IoT/ IoV Security and Privacy
	8.1 Introduction
	8.2 IoV-Enabling Technologies and Architectures
		8.2.1 IoV Technologies
			8.2.1.1 Sensing Technologies
			8.2.1.2 Intravehicle Communication
			8.2.1.3 V2X Communication
		8.2.2 IoV Architectures
			8.2.2.1 Edge– Fog–Cloud Architecture
	8.3 IoV Security: Challenges, Threats, and Countermeasures
		8.3.1 Formal Methods and IoT Security
		8.3.2 IoT and IoV Security Classification
			8.3.2.1 Authentication
			8.3.2.2 Authorization
			8.3.2.3 Confidentiality
			8.3.2.4 Integrity
			8.3.2.5 Privacy
			8.3.2.6 Data Availability
			8.3.2.7 Quality of Service ( QoS)
		8.3.3 IoV Attacks
			8.3.3.1 Denial of Service ( DOS)
			8.3.3.2 Sybil Attack
			8.3.3.3 GPS Deception
			8.3.3.4 Masquerading
			8.3.3.5 Eavesdropping
			8.3.3.6 Routing Attack
		8.3.4 IoV Attacks Countermeasures
	8.4 Fog-Based Approach for IoV Security
		8.4.1 Related Works
		8.4.2 Fog-Based Security Architecture: Overview
			8.4.2.1 Fog Node Architecture
			8.4.2.2 Edge Node Architecture
		8.4.3 InterFog-A Functionalities and Scenarios
			8.4.3.1 Establish a Trusted Connection between an Edge Device and Fog Services
			8.4.3.2 Establish a Trusted Connection between Edge Devices
			8.4.3.3 Handover Mechanism
	8.5 Conclusion
	Acknowledgment
	References
Chapter 9 An Overview of Blockchain and its Applications in the Modern Digital Age
	9.1 Introduction
	9.2 Blockchain Concepts
		9.2.1 Consensus Algorithm
		9.2.2 Hash Function
	9.3 Blockchain Technologies for Security
		9.3.1 Role of the Hash Function in Cryptography
		9.3.2 Security as Decentralization
		9.3.3 Public and Private Blockchain
		9.3.4 Analytical Intelligence
		9.3.5 Advantages of Blockchain Security
	9.4 Security and Trust Issues in IoT
		9.4.1 IoT Security Aspects
		9.4.2 IoT Communication Security
	9.5 Blockchain and IoT
		9.5.1 Blockchain for IoT Security
		9.5.2 Blockchain Benefits for IoT Security
	9.6 Future Trends
	9.7 Conclusions
	References
Chapter 10 Blockchain as a Lifesaver of IoT: Applications, Security, and Privacy Services and Challenges
	10.1 Introduction
	10.2 History and Evolution of Internet of Things
		10.2.1 Elements of Internet of Things
			10.2.1.1 Sensors/Gadgets
			10.2.1.2 Security
			10.2.1.3 Communication
			10.2.1.4 Information
			10.2.1.5 Network
			10.2.1.6 Connectivity
		10.2.2 Architecture of Internet of Thing
			10.2.2.1 Three-Layered IoT Architecture
			10.2.2.2 Five-Layered IoT Architecture
		10.2.3 Major Issues of Internet of Things
			10.2.3.1 Cloud Attacks
			10.2.3.2 Internet Walls
			10.2.3.3 Lack of Confidence
			10.2.3.4 Privacy
			10.2.3.5 Security
	10.3 Blockchain as a Solution for IoT
	10.4 More about Blockchain
		10.4.1 Background of Blockchain
			10.4.1.1 Architecture of Blockchain
			10.4.1.2 Mining a Block in a Blockchain
			10.4.1.3 Fundamental Properties of Blockchain
		10.4.2 Privacy or Confidentiality Services of Blockchain
			10.4.2.1 Data Privacy and Access Control List
			10.4.2.2 Significance of Confidentiality in Existing Applications
			10.4.2.3 Conventional Approaches for Privacy of Data
			10.4.2.4 Challenges of the Conventional Approaches
			10.4.2.5 Data Privacy Approaches Based on Blockchain
	10.5 Blockchain-Based Internet of Things
		10.5.1 Applications of Blockchain for the IoT
			10.5.1.1 Intrusion Detection
			10.5.1.2 Disseminated P2P Applications
			10.5.1.3 IoT in the Era of 5G
			10.5.1.4 Internet of Things Gadgets
			10.5.1.5 Crowdsensing Applications
			10.5.1.6 Edge Computing
			10.5.1.7 Data Storage
		10.5.2 Basic Concept of Security and Privacy in IoT Based on Blockchain
			10.5.2.1 Trust
			10.5.2.2 Certification
			10.5.2.3 Preservation of Confidentiality
		10.5.3 Challenges of Blockchain
			10.5.3.1 Communication Overhead
			10.5.3.2 Time Consumption
			10.5.3.3 Scalability
			10.5.3.4 Anonymity and Confidentiality
			10.5.3.5 Computation and Mining Nodes
	10.6 Conclusion
	References
Chapter 11 Business Operations and Service Management within Blockchain in the Internet of Things
	11.1 Introduction
	11.2 Provision and Management of IoT Security
		11.2.1 Geopolitical Considerations
		11.2.2 IoT Security from an Integrated Service
			11.2.2.1 Devices and Management
			11.2.2.2 Infrastructure and Management
			11.2.2.3 Information Management
			11.2.2.4 Service and Operations
		11.2.3 IoT Security from Integrated Management
		11.2.4 IoT Security from Layered Management
	11.3 Operations and Service Management in Security of the IoT
		11.3.1 Business in the Security of the IoT
		11.3.2 Business Management in Security of the IoT
			11.3.2.1 Vulnerability Management
			11.3.2.2 Ethics
			11.3.2.3 Business Drivers in IoT Security
			11.3.2.4 Regulatory and Compliance in IoT Security
			11.3.2.5 Audit in IoT Security
		11.3.3 Service Management in Security of the IoT
		11.3.4 Technical Management in Security of the IoT
			11.3.4.1 Network Layer
			11.3.4.2 Device Layer
			11.3.4.3 Information Layer
		11.3.5 Automation within Security for IoT
	11.4 Blockchain in the Future Trends of Security in the IoT Security
	11.5 Conclusion
	References
Chapter 12 IoT-Based Healthcare: Personalized Health Monitoring Using Machine Learning and Blockchain for Security of Data
	12.1 Introduction
	12.2 IoT in Healthcare
		12.2.1 Some of the Major Advantages of Applying IoT in Medical Sector
		12.2.2 Objective of IoT in Healthcare
		12.2.3 Methodology for Implementing IoT in Healthcare Devices
	12.3 IoT and Machine Learning in Healthcare
	12.4 Communication Technology Used in IoT in Healthcare
		12.4.1 RFID and NFC
		12.4.2 LR-WPAN
		12.4.3 Bluetooth
		12.4.4 ZigBee
		12.4.5 Wireless-Fidelity ( Wi-Fi)
		12.4.6 Worldwide Interoperability for Microwave Access ( WiMAX)
		12.4.7 Mobile Communications
		12.4.8 Wireless Sensor Networks ( WSN)
	12.5 IoT Communication Models
		12.5.1 Device-to-Device Communication Model
		12.5.2 Device-to-Cloud Communications
		12.5.3 Device-to-Gateway Model
		12.5.4 Backend Data Sharing Model
	12.6 Challenges of IoT Application in Healthcare
		12.6.1 Data Security in IoT Applications in Healthcare
		12.6.2 Blockchain to the Rescue in Healthcare Data Security
	12.7 Conclusion
	References
Chapter 13  Blockchain-Based Regenerative E-Voting System
	13.1 Introduction
	13.2 Literature Survey
	13.3  Blockchain-Based Regenerative  E-Voting System
		13.3.1 Types of Blockchain and Consensus Protocols
		13.3.2 Registration Phase
		13.3.3 Initiation Phase
		13.3.4 Verification Phase
		13.3.5 Voting Phase
		13.3.6 Election Result Phase
	13.4 Use Cases
	13.5 Possible Attacks on Blockchain Network
	13.6 Results and Discussions
	13.7 Conclusion and Future Trends
	References
Chapter 14 Blockchain Application of IoT for Water Industry and Its Security
	14.1 Introduction
	14.2 Issues and Challenges in IoT
		14.2.1 Brief Introduction to IoT
		14.2.2 Security Issues and Challenges of IoT
			14.2.2.1 General Challenges
			14.2.2.2 Centralized Sever
			14.2.2.3 Technical Challenges
			14.2.2.4 Security Attacks Types
			14.2.2.5 Design Issues
			14.2.2.6 Blockchain Challenges with IoT
	14.3 Issues and Challenges in Intelligent Water Industry Integrated with IoT
		14.3.1 Current Issues in Water Management
			14.3.1.1 Monitoring Limitations
			14.3.1.2 Number of Wells
			14.3.1.3 Design Issues
			14.3.1.4 Statistics
		14.3.2 Is Blockchain the Rescue?
			14.3.2.1 Decentralization
			14.3.2.2 Immutability
			14.3.2.3 Auditability
			14.3.2.4 Immutability
		14.3.3 Other Salient Features
			14.3.3.1 Anonymity
			14.3.3.2 Veracity
			14.3.3.3 Transparency
			14.3.3.4 Trust
			14.3.3.5 Turing-Complete
		14.3.4 IoT Application for Smart Water Management
	14.4 Issues and Challenges in IoT
		14.4.1 Synopsis of Blockchain Technology
		14.4.2 The Construction of Blockchain
			14.4.2.1 Nodes
			14.4.2.2 Components
			14.4.2.3 Mining Formula
		14.4.3 How Blockchain Works?
			14.4.3.1 Hash Encryption
			14.4.3.2 Electronic Signature
			14.4.3.3 Correct Mechanism
		14.4.4 Various Types of Blockchain
			14.4.4.1 Public ( Bitcoin, Ethereum)
			14.4.4.2 Private ( R3, Corda)
			14.4.4.3 Consortium ( Monax, Multichain)
		14.4.5 Development of Blockchain Technology
			14.4.5.1 Development Path
			14.4.5.2 Typical Applications
			14.4.5.3 Blockchain 1. 0—Cryptocurrencies
			14.4.5.4 Blockchain 2.0
			14.4.5.5 Blockchain 3.0
		14.4.6 The Comparison of Technology
			14.4.6.1 Smart Contracts in Blockchain
			14.4.6.2 Distributed Autonomous Organization ( DAO) and Centralized Autonomous Organization ( CAO)
			14.4.6.3 Ethereum in Blockchain Application with IoT
	14.5 Blockchain Application for Water Industry Security
		14.5.1 Why Blockchain Has Good Prospects in Application?
			14.5.1.1 Water Crisis Is Approaching
			14.5.1.2 Smart Water Based on Blockchain Technology Is Urgent
		14.5.2 Security Issues and Challenges of Intelligent Water Management
			14.5.2.1 Security Standards
			14.5.2.2 Data Transmission
			14.5.2.3 Protection System
		14.5.3 Factors Need to be Considered for Blockchain Applications in Water Industry
			14.5.3.1 Record
			14.5.3.2 Compliance Reporting/ Audit
			14.5.3.3 Data Reconciliation
			14.5.3.4 Bond Issuance on Blockchain
	14.6 Application Summary
		14.6.1 Origin Clear
		14.6.2 Civic Ledger
		14.6.3 AQUAOSO
		14.6.4 Newater Technology Works
		14.6.5 A Water Management Partner
		14.6.6 Recommendation
	14.7 Conclusion and Future Works
	Acknowledgements
	References
Index




نظرات کاربران