Search

Browse Subject Areas

For Authors

Submit a Proposal

Evolving Networking Technologies

Developments and Future Directions
Edited by Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma and Dac-Nhuong Le
Copyright: 2023   |   Status: Published
ISBN: 9781119836209  |  Hardcover  |  
266 pages | 115 illustrations
Price: $195 USD
Add To Cart

One Line Description
This book discusses in a practical manner some of the critical security
challenges facing the ever-evolving networking technologies of today.

Audience
This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

Description
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.
The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.
The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:
• Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
• Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
• Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.

Back to Top
Author / Editor Details
Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in international journals and conference proceedings.

Shaurya Gupta, PhD, is an assistant professor at the University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India. He completed his PhD in Information Technology from Amity University and has published research articles in international journals. His areas of interest are Delay Tolerant Networks, Wireless Sensor Networks, Ad Hoc Networks, IOT, and Machine Learning.

Ashish Sharma, PhD, is one of the key faculty members of the information retrieval and data mining group at GLA University, India. He has published many research papers in international journals, and his research interests are in the applications of data mining, machine learning, big data, business analytics, data/text mining, healthcare informatics, and service-oriented computing.

Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has over 50 publications and edited/authored 15 computer science books.

Back to Top

Table of Contents
List of Figures
List of Tables
Foreword
Preface
Acknowledgments
Acronyms
1. 5G Technologies, Architecture and Protocols

Shweta Bondre, Ashish Sharma, Vipin Bondre
1.1 Evolution of Wireless Technologies
1.2 5G Cellular Network Architecture
1.2.1 5G E2E Network Architecture
1.2.2 Network Slicing Architecture
1.2.3 NFV Management and Orchestration
1.2.4 NGMN Envisioned 5G Design
1.3 5G Energy Efficiency
1.3.1 Full Duplex
1.3.2 High Network Data Rate
1.3.3 Dense Small Cell Deployment
1.3.4 Massive MIMO Antennas
1.4 Security in 5G
1.5 5G Applications
1.5.1 Rapid Data Transmission
1.5.2 5G Flexibility for Smart Mobility
1.5.3 5G in Smart Cities
1.5.4 5G Augmented Reality
1.6 Conclusion
References
2. Scope and Challenges of IoT and Blockchain Integration
Sara Shree, Monika Sharma
2.1 Introduction
2.2 Literature Review
2.3 Internet of Things and Its Centralized System
2.3.1 Application Layer
2.3.2 Network Layer
2.3.3 Device Layer
2.4 Blockchain Technology
2.4.1 Characteristics of Blockchain
2.4.2 Working Mechanisms of Blockchain
2.4.3 Example of Blockchain Transactions
2.4.4 Need for Blockchain Technology
2.5 Integration of Blockchain and IoT Technology
2.5.1 Interactions of IoT and Blockchain Integrations
2.5.2 Blockchain Platforms for IoT
2.5.3 Advantages of Integrating IoT with Blockchain
2.5.4 Challenges of Blockchain and IoT Integration
2.5.5 Applications of IoT-Blockchain Integration
2.6 Conclusion
References
3. Data Communication and Information Exchange in Distributed IoT Environment
Rachna Jain, Kanta Prasad Sharma, Rana Majumdar, Dac-Nhuong Le
3.1 Introduction
3.2 IoT Technologies and Their Uses
3.2.1 How WSN Works
3.2.2 Communication with RIFD-Enabled Devices
3.2.3 WWW - Things on the Web
3.3 Centralized vs. Distributed Approach
3.3.1 Centralized System and Its Physiognomies
3.3.2 Advantages
3.3.3 Disadvantages of Centralized System
3.4 Distributed System Architecture
3.4.1 Advantages of Distributed System Architecture
3.4.2 Drawbacks of Distributed System Architecture
3.5 Data Communication Taking Place in Distributed IoT Environment
3.5.1 Internet of Things (IoT) Protocol
3.5.2 Constrained Application Protocol (CoAP)
3.5.3 Message Queuing Telemetry Transport (MQTT)
3.5.4 Wi-Fi
3.5.5 Zigbee
3.5.6 Extensible Messaging and Presence Protocol (XMPP)
3.5.7 Data Distribution Service (DDS)
3.5.8 Advanced Message Queuing Protocol (AMQP)
3.5.9 Smart Home and IoT Applications: An Example
3.5.10 IoT Services, Machines and Applications
3.5.11 Sensor-Based IoT Services
3.5.12 Application in IoT Environment
3.5.13 Future of IoT in a COVID-19 Pandemic
3.6 Conclusion
References
4. Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction
Neeraj Kumar Pandey, Sampoorna Kashyap, Ashish Sharma, Manoj Diwakar
4.1 Introduction
4.2 Cloud-Based Solutions
4.2.1 Information and Communications Technology
4.2.2 Artificial Intelligence and Machine Learning
4.2.3 Data Analytics and Business Intelligence
4.3 Impact of Industry 4.0 in the Cloud Computing Industry
4.3.1 Agriculture and Forestry
4.3.2 Entertainment, Media, and Hospitality
4.3.3 Robotics and Automation, Manufacturing and Maintenance
4.4 Significance and Impact of Cloud in the Pandemic Outbreak
4.5 Conclusion and Future Directions
References
5. Network Security in Evolving Networking Technologies: Developments and Future Directions
Uma Yadav, Ashish Sharma
5.1 Introduction
5.2 Background on Attacks, Security Services and Challenges
5.2.1 Types of Attacks Possible on Network
5.2.2 Security Services
5.2.3 Challenges
5.3 Evolution of Network Security Strategies
5.4 Different Evolving Security Approaches
5.4.1 Conventional Approaches
5.4.2 Confidentiality Approaches
5.4.3 Privacy Approaches
5.4.4 Availability Approaches
5.4.5 Modern Approaches
5.5 Discussion
5.6 Conclusion
References
6. The State of CDNs Today and What AI-Assisted CDN Means for the Future
Darothi Sarkar, Rana Majumdar, Dac-Nhuong Le
6.1 Introduction
6.2 CDN and Its Challenges
6.2.1 Replica Server Placement
6.2.2 Content Replication
6.2.3 Request Routing
6.2.4 Load Balancing
6.3 Importance of AI in CDN
6.4 Pandemic and CDN
6.5 Security Threats in CDN
6.6 Conclusion
References
7. Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing
Jayden Pires, Vinod Kumar Shukla, Leena Wanganoo, Sonali Vyas
7.1 Introduction
7.2 Literature Review
7.2.1 Smart City and Network Management
7.2.2 Blockchain and Network
7.3 Blockchain and Smart City
7.3.1 Smart Healthcare
7.3.2 Smart E-Voting
7.3.3 Smart Logistics and Supply Chains
7.4 Cloud Computing and Challenges
7.4.1 Cloud Computing
7.5 Research Methodology
7.6 Conclusion
References
8. Role of IoT in Smart Homes and Offices
Shaurya Gupta, Sonali Vyas, Kanta Prasad Sharma
8.1 Introduction
8.2 Smart Building Constituents
8.3 Concept of Smart Office Service Devices
8.4 IoT in Smart Homes and Offices
8.4.1 Smart Environment Models
8.4.2 IoT Control Systems for Smart Home Devices
8.4.3 Prevailing Designs in Smart Homes
8.4.4 Smart Home Constituents
8.4.5 Cloud Topological Structure
8.4.6 Smart Home-Based Cloud Architectural Design
8.5 Future Research Directions and Limitations of Smart Home-Based Technology
8.6 Conclusion
References
9. Role of IoT in the Prevention of COVID-19
Ankit Saxena, Akash Sanghi, Swapnesh Taterh, Neeraj Bhargava
9.1 Introduction
9.2 A Modern Era Problem
9.2.1 Current Risk
9.2.2 Awareness by Social Media
9.2.3 Review of Current Solutions
9.2.4 Current Treatment
9.3 Technology
9.3.1 Touchless User Interface
9.3.2 IR Sensor Working Principle
9.4 IoT Sensors and Board
9.4.1 Arduino UNO Board
9.4.2 Arduino USB Cable
9.4.3 Pulse Rate Sensor
9.4.4 IR Sensor
9.4.5 Temperature Sensors
9.4.6 Proximity Sensors
9.4.7 Pressure Sensors
9.4.8 LCD Display
9.4.9 Relay
9.4.10 Power Supply
9.4.11 Jumping Wires
9.5 Use of IoT in COVID-19 Prevention
9.6 Conclusion
References
10. Role of Satellites in Agriculture
Prashant Johri, Kanta Prasad Sharma, Aadrit Chauhan, Sunilkkhatri
10.1 Introduction
10.2 Processing Satellite Images
10.3 Product Levels of Satellite Remote Sensing Data
10.3.1 A Brief Discussion and Review of Analysis Techniques
10.3.2 Machine Learning
10.3.3 Deep Learning
10.4 Future Challenges
10.5 Conclusion
References
11. Search Engine Evaluation Methodology
JN Singh, Prashant Johri, Gaurav Dhuriya, Kanta Prasad Sharma
11.1 Introduction
11.2 Performance Evaluation Forum
11.2.1 Text Retrieval Conference
11.2.2 Text Retrieval Conference Tracks
11.3 Search Engine Evaluation Parameters
11.3.1 Precision
11.3.2 Recall
11.3.3 Problems with Precision and Recall
11.3.4 Discounted Cumulative Gain
11.3.5 Normalized DCG
11.3.6 Click-Through
11.3.7 Eye Tracking
11.3.8 Coverage
11.3.9 Response Time
11.4 Factors Affecting Search Engines
11.4.1 Evaluation
11.4.2 Query Formulation
11.4.3 User Feedback to a Web Page
11.4.4 W3 Rules
11.4.5 Web Developers’ Fake Techniques
11.5 Conclusion
References
12. Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA
Seema Nayak, Manoj Nayak, Shamla Matri, Kanta Prasad Sharma
12.1 Introduction
12.2 Literature Survey
12.3 Methods and Materials
12.3.1 Conversion of MATLAB Code into Verilog HDL
12.3.2 Synthesis of Digital Filters on FPGA
12.4 Results and Discussion
12.4.1 Butterworth Filter
12.4.2 Chebyshev-I Filter
12.4.3 Chebyshev-II Filter
12.4.4 Elliptic Filter
12.5 Conclusion and Future Scope
References
13. Neural Networks and Their Applications
Shivani Joshi, Anju Gera, Sweta Bhadra
13.1 Introduction
13.2 Main Work of Neuron
13.3 Comparison Between Artificial Neural Network (ANN) and Biological Neural Network (BNN)
13.4 How Artificial Neural Network Works
13.4.1 Processing of ANN Building Blocks
13.4.2 Neural Network Learning Rules
13.5 Neural Networks and Their Applications
13.5.1 Image Processing and Character Recognition
13.5.2 Business Forecasting
13.5.3 Financial Prediction
13.5.4 Additional Neural Network Uses in the Economic World
13.5.5 The Traveling Salesman Problem
13.5.6 Medicine
13.5.7 Electronic Nose
13.5.8 Security
13.5.9 Loans and Credit Cards
13.5.10 Other Applications of Neural Networks
13.6 Conclusion and Future Scope
References
Editors

Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page