Search

Browse Subject Areas

For Authors

Submit a Proposal

Trust-Based Communication Systems for IoT Applications

Edited by Prateek Agrawal, Vishu Madaan, Anand Sharma, Dilip Kumar Sharma, and Akshat Agrawal
Copyright: 2022   |   Status: Published
ISBN: 9781119896333  |  Hardcover  |  
334 pages
Price: $195 USD
Add To Cart

One Line Description
Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.


Audience
Technical software developers, security professionals, managers, policymakers, data analytics managers, researchers, academics, information architects, and graduates in the field of communications and IoT

Description
With an enormous range of applications, Internet of Things (IoT) has magnetized industries and academics from everywhere. IoT facilitates communication and operations through Internet access to all the devices with computing capabilities. Many applications can be applied in IoT, such as intelligent transportation systems, real-time medical monitoring, intelligent appliances and intelligent agriculture and smart grid. Internet of Things makes a smart communication process between objects and their environment over the internet. IoT creates a world where smart objects and services interact autonomously, and, therefore, a central issue is whether the service provided by a selected IoT device is trustworthy. Further, most IoT devices are mobile and will connect to the Internet on and off, depending on the location they roam into as well as the energy status of individual IoT devices. Taking into account the dynamic heterogeneous characteristic of interconnected devices in IoT, it demands for an effective and efficient trust-based IoT communication system that can scale to a large number of heterogeneous devices in IoT systems. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace.

The Major objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using IOT devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.


Back to Top
Author / Editor Details
Prateek Agrawal, PhD, is a post-doctoral researcher at the department of ITEC, University of Klagenfurt, Austria and an associate professor in the School of Computer Science Engineering, Lovely Professional University, India. With over 10 years of research and teaching experience, he received his PhD from IKG-Punjab Technical University, India. He has authored more than 50 research papers in scholarly journals and conferences and is a reviewer and editorial member of numerous journals. He also served as technical program committee member of many technical conferences.

Vishu Madaan, MTech, is an assistant professor with Lovely Professional University and is pursuing her PhD in computer science at IKG-Punjab Technical University, Punjab. She has more than six years of teaching and research experience and has authored more than 30 research articles in peer-reviewed conferences and journals. She is also a reviewer for many international conferences and scholarly journals.

Anand Sharma, PhD, received his PhD in engineering from MUST, Lakshmangarh. He has been working with Mody University of Science and Technology, Lakshmangarh for the last 10 years and has more than 14 years of experience of teaching and research. He has organized more than 15 conferences, seminars, and workshops and has chaired more than eight special sessions and delivered six keynote addresses in international conferences. He is an editorial member for several international journals on the organizing committees for several scientific conferences.

Dilip Kumar Sharma, PhD, is a professor and associate dean in the Department of Computer Engineering and Applications, GLA University, Mathura, U.P, India and is working on several research projects funded by government agencies. He has co-edited three books, delivered or chaired more than 70 guest lectures and has been guest editor on several scientific journals. He has organized more than 12 scholarly conferences and workshops and has published more than 100 research papers in scientific journals. He also has several scholarly awards to his credit.

Akshat Agrawal, BTech, is an assistant professor at the Amity School of Engineering and Technology, Amity University Haryana. He has a total of 10 years of teaching and research experience and has published 29 research papers in reputed refereed international journals. He has been a visiting faculty member at Technical University Kosice, Slovakia and is a reviewer for research papers and book chapters for several scholarly and scientific conferences.

Back to Top

Table of Contents
Preface
Book Description
1. An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation

Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh
1.1 Introduction
1.2 Growth of IoT
1.3 IoT Technologies
1.4 Application Areas of Internet of Things
1.5 IoT Security and Protection Concerns
1.6 IoT Security
1.7 Conclusion
References
2. Blockchain in IoT and Limitations
Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal
2.1 Introduction
2.2 Literature Review
2.3 Limitations of Blockchain
2.4 Conclusion
References
3. IoT Protocol Security Mechanisms
D. Karthika and Dr. K. Kalaiselvi
3.1 Introduction
3.2 Comparing to IoT Security and Cyber-Physical Structures
3.3 Potential IoT and the Need for Safety
3.4 Future-Cognitive Structures and IoT
3.5 Security Engineering for IoT Development
3.6 Building Security into Design and Development
3.7 Security in Agile Developments
3.8 Focusing on the IoT Device in Operation
3.9 IoT Security Innovation Cryptographic Basics
3.10 Cryptographic Primitive Forms and Implementations in the IoT
3.11 Encryption and Decryption
3.12 Hashes
3.13 Digital Signatures
3.14 Generation of Random Numbers
3.15 Cloud Security for IoT
3.16 Control of Assets/Inventories
3.16.1 Service Provisioning, Billing, and Entitlement Management
3.16.2 Real-Time Monitoring
3.16.3 Sensor Coordination
3.16.4 Customer Intelligence and Marketing
3.16.5 Information Sharing
3.16.6 Message Transport/Broadcast
Conclusion
References
4. IoT Security, Privacy, Challenges, and Solutions
Ankit Garg, Ashima Gambhir and Prachi Goel
4.1 Introduction
4.1.1 Elements of Internet of Things (IoT)
4.2 IoT Landscape: Current and Potential Applications
4.3 Advantages of Internet of Things (IoT)
4.4 Architecture of IoT Systems
4.4.1 Five Layered Architecture
4.4.2 Fog Based IoT Architecture
4.5 IoT Security
4.5.1 Security Requirements in IoT Systems
4.6 Security Challenges in IoT Architecture
4.6.1 Security Challenges and Requirements at Perception Layer
4.6.2 Security Issues and Requirements at Network Layer
4.6.3 Security Issues and Requirements at Application Layer
4.7 Security by Design in IoT
4.8 Best Practices to Secure IoT Devices
4.9 Security Attacks in IoT System
4.9.1 Physical Attacks
4.9.2 Software Attacks
4.9.3 Network Attacks
4.9.4 Encryption Attacks
4.10 Various IoT Security Challenges
4.11 Limitations of Available Resources
4.11.1 Big Data
4.11.2 Authorization and Access Control
4.11.3 Secure Communication
4.11.4 System Flexibility
4.11.5 Complex System
4.11.6 IoT Privacy
4.11.7 Threats in IoT Privacy
4.11.8 Detection
4.11.9 Localization and Tracking
4.11.10 Profiling
4.11.11 Life-Cycle Transitions
4.11.12 Inventory Attack
4.11.13 Linkage
4.12 Solutions to Preserve Privacy in IoT Systems Conclusions
References
5. CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System
Gaurav Jolly and Rahul Johari
5.1 Introduction
5.2 Cyber Physical System: Definition
5.3 System Interfaces
5.4 Communication Channel
5.5 Physical Interaction
5.6 CPS vs IoT
5.7 Cyber Physical System Issues
5.8 Literature Survey
5.9 Applications of Cyber Physical System
5.10 Future of Cyber Physical Systems
5.11 Conclusion
References
6. Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology
Sivasankari Narasimhan
6.1 Introduction
6.1.1 Essential Security Things to be Satisfied in Each IoT Node
6.1.2 Fault Categories of PUF Node Malfunctioning
6.2 Related Works
6.3 Trust Calculation Basics
6.3.1 Trust Classification
6.3.2 Direct Trust and Indirect Trust
6.4 Deriving Trust Relationships
6.5 Trust Derivation Examples
6.6 Combination of Trust Relationship
6.7 Analysis of Attacks
6.8 Conclusions
References
7. Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management
Prachi Goyal, Ankit Garg and Prakhar Jindal
7.1 Introduction
7.2 Literature Review
7.3 Overview of System Architecture
7.4 Experiments and Comparison
7.5 Database for Experiment
7.6 Assessment of the Index Structure
7.7 Performance Evaluation of Exact Search
7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search
7.9 Evaluation of Data Distribution
7.10 Conclusion
References
8. Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact
Nabeela Hasan, Mansaf Alam and Jamia Millia Islamia
8.1 Introduction
8.2 An Efficient Approach Towards IIoT Technology
8.3 Evolution of IIoT
8.4 IIoT Architecture
8.5 Industrial Applications of IoT
8.6 Smart Manufacturing
8.7 Smart HealthCare
8.8 Smart Transportation
8.9 Smart Cities
8.10 Oil and Gas Industry
8.11 Logistics and Supply Chain
8.12 Basic Technologies of IIoT
8.13 Things Over Internet
8.14 Technology on Blockchain
8.15 Computing of Data over Cloud Technology
8.16 Artificial Intelligence and Cyber Physical Systems
8.17 Analytics on Management of Big Data
8.18 Future Technologies: Augmented and Virtual Reality
8.19 Industry 4.0
8.19.1 Design Principles
8.19.2 Virtualizations
8.19.3 Interoperability
8.19.4 Real-Time Capability
8.19.5 Decentralization
8.19.6 Modularity
8.19.7 Service Orientation
8.19.8 Future of IIoT
8.20 Research Challenges
8.20.1 Energy Efficiency
8.20.2 Coexistence and Interoperability
8.20.3 Real-Time Performance
8.20.4 Security and Privacy
8.20.5 Fault Detection and Reconfiguration
8.20.6 User-Friendliness in Product Deployment and Usage
8.21 Conclusions
References
9. Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment
Niva Rana Mahanta and Suvarna Lele
9.1 Fundamentals of Smart Cities
9.1.1 Introduction and Literature Study
9.1.2 Smart and Human-Centric Livable Cities
9.1.3 Smart Cities and Sustainable Environment
9.1.4 Implementation Strategies for City Planning and Urban Design Parameters
9.1.5 Remote Monitoring and Management (RMM) in Upcoming City Development
9.2 Case Study Analysis
9.2.1 Dubai, United Arab Emirates
9.2.2 Seoul, South Korea
9.2.3 Barcelona, Spain
9.2.4 Singapore 220
9.3 Smart Buildings in Smart Cities: Humane Approach
9.3.1 Smart Interiors
9.3.2 Technological Interventions
9.3.3 Building Automation
9.3.4 Benefits and Challenges
9.4 Future Scope and Impact on Society
9.5 Conclusion
References
10. T-Secure IoT in Smart Home System
Esra SİPAHİ, Md Harun Rashid and Erkin ARTANTAŞ
10.1 Introduction
10.2 Literature
10.2.1 Smart Home Description
10.2.2 Smart Homes and Technology from Past to Present
10.2.3 Smart Home Automation
10.2.4 Automation Systems
10.2.5 Lighting Systems
10.2.6 Current Smart Building Systems’ Interactive
10.2.7 Block Diagram
10.3 Method
10.3.1 Hardware Implementation
10.3.2 Software Iplementation
10.4 Chematic Implementation
10.5 Simulation and Result
10.6 Conclusion
References
11. Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan
11.1 Introduction
11.2 Intelligent Transport System
11.3 Technologies Used in Intelligent Transport Systems
11.4 Micro Mobility
11.5 Case Study
11.6 Methodology: Value – Steam Mapping the Existing Operations
11.7 Operational Challenges Faced by Arnab Micro Mobility
11.8 Conclusion
References
12. Automatic Booking of LPG and Leakage Detection System Using IoT
Aishwarya Jain, Meghana H M and Annaiah H
12.1 “What is IoT?”
12.2 Why IoT Matters
12.2.1 Collecting and Sending Information
12.2.2 Receiving and Acting on Information
12.2.3 Doing Both: The Goal of an IoT System
12.3 The oneM2M IoT Standardized Architecture
12.4 The IoT World Forum (IoTWF) Standardized Architecture
12.5 A Simplified IoT Architecture
12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT
12.6.1 Problem Statement
12.6.2 Proposed Solution
12.6.3 Architecture of the System
12.6.4 System Setup
12.6.5 Working of System
12.7 Conclusion
References
Index

Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page