3 Chapter 3Figure 3.1. The four visions of the IoT (Akinyoade and Eluwole 2019)Figure 3.2. Cloud, Fog and Edge. For a color version of this figure, see www.ist...Figure 3.3. Features for spectrum management in intelligent radio. For a color v...Figure 3.4. Integration of multiple technologies in the IoT. For a color version...
4 Chapter 4Figure 4.1. Architecture of the Internet of Things (Khalil et al. 2018). For a c...Figure 4.2. MAPE-K Control loopFigure 4.3. MAPE-K loop from the IoT energy self-optimization framework. For a c...Figure 4.4. Membership functions of the “distance” parameter. For a color versio...Figure 4.5. Membership functions of the “residual energy” parameter. For a color...Figure 4.6. Membership functions of the “precision” parameter. For a color versi...Figure 4.7. Membership functions of the output parameter. For a color version of...Figure 4.8. Decision-making algorithmFigure 4.9. Lifespan of the IoT system for scenarios 1 and 2Figure 4.10. Lifespan of the IoT system for scenario 3Figure 4.11. Average precision of the information recorded in scenario 4. For a ...Figure 4.12. Selection of IoT objects over time in scenario 4. For a color versi...
5 Chapter 5Figure 5.1. Example of star topology and mesh topology in an IoT network. For a ...Figure 5.2. Example of a size 6 slotframe, for a 4-node network and a coordinato...Figure 5.3. Example of TSCH schedule and topology showing Replication, Overheari...
6 Chapter 6Figure 6.1. Architecture of an energy-harvesting sensor node. For a color versio...Figure 6.2. Energy buffer thresholds. For a color version of this figure, see ww...Figure 6.3. Periodic execution of the EM. For a color version of this figure, se...Figure 6.4. Architecture of energy managers with and without prediction. For a c...Figure 6.5. Fuzzyman architectureFigure 6.6. Membership functions used by the fuzzing unitFigure 6.7. Performance of Fuzzyman and P-FREEN depending on P AVGfor different ...Figure 6.8. Global RLMan architecture. For a color version of this figure, see w...Figure 6.9. Average packet generation rate and energy efficiency depending on th...Figure 6.10. Architecture of harvesting multisource energy for LoRa standard. Fo...Figure 6.11. Performance of different EMs over 7 days of execution. For a color ...
7 Chapter 7Figure 7.1. XACML components and modules (XACML 2019)Figure 7.2. Integrating XACML and SAML (OASIS 2019c)Figure 7.3. Security architecture for the Internet of Things. For a color versio...Figure 7.4. IoT access control environment. For a color version of this figure, ...Figure 7.5. IoT-MAAC-MAAC access control architecture. For a color version of th...Figure 7.6. DPS notation system. For a color version of this figure, see www.ist...Figure 7.7. DSL notation system. For a color version of this figure, see www.ist...Figure 7.8. DOT notation system. For a color version of this figure, see www.ist...Figure 7.9. DPS, DSL and DOT membership functions. For a color version of this f...Figure 7.10. IoT-MAAC decision-making algorithm. For a color version of this fig...Figure 7.11. SAML assertion of the IoT object. For a color version of this figur...Figure 7.12. XACML authorization request from the LL-Gw in IoT-MAAC. For a color...Figure 7.13. XACML response from the HL-Gw in IoT-MAAC. For a color version of t...
8 Chapter 8Figure 8.1. Biometric techniques (Cabra et al. 2018)Figure 8.2. The evolution of authentication methods from simple authentication t...Figure 8.3. Registration phase of Sammoud et al. (2020c). For a color version of...Figure 8.4. Login phase of Sammoud et al. (2020c). For a color version of this f...Figure 8.5. a) Authentication phase of Sammoud et al. (2020c); b) Protocol authe...Figure 8.6. An ECG sequence (Sammoud et al. 2020a). For a color version of this ...Figure 8.7. Overall structure of an authentication system based on ECGFigure 8.8. Acquiring an ECG signal. For a color version of this figure, see www...
9 Chapter 9Figure 9.1. Blockchain architecture (Che et al. 2019). For a color version of th...Figure 9.2. a) Traditional intelligent identity and access management; b) Blockc...
10 Chapter 10Figure 10.1. Lifecycle of a context. For a color version of this figure, see www...Figure 10.2. Example of implementing context-aware security (Sylla et al. 2021).Figure 10.3. CASPaaS architecture (Sylla et al. 2020). For a color version of th...
11 Chapter 11Figure 11.1. Number of scientific publications per year with “Moving Target Defe...Figure 11.2. MTD taxonomies and network layers (with a reference to the section ...Figure 11.3. Components of the proposed MTD framework. For a color version of th...
1 Cover
2 Table of Contents
3 Title Page SCIENCES Networks and Communications , Field Director – Guy Pujolle Network Management and Control , Subject Head – Francine Krief
4 Copyright First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2022 The rights of Mohamed-Aymen Chalouf to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group. Library of Congress Control Number: 2022931274 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78945-053-8 ERC code: PE7 Systems and Communication Engineering PE7_1 Control engineering PE7_8 Networks (communication networks, sensor networks, networks of robots, etc.)
5 Begin Reading
6 List of Authors
7 Index
8 End User License Agreement
1 v
2 iii
3 iv
4 1
5 2
6 3
7 4
8 5
9 6
10 7
11 8
12 9
13 10
14 11
15 12
16 13
17 14
18 15
19 16
20 17
21 18
22 19
23 20
24 21
25 22
26 23
27 24
28 25
29 27
30 28
31 29
32 30
33 31
34 32
35 33
36 34
37 35
38 36
39 37
40 38
41 39
42 40
43 41
44 42
45 43
46 44
47 45
48 46
49 47
50 48
51 49
52 50
53 51
54 52
55 53
56 54
57 55
58 57
59 58
60 59
61 60
62 61
63 62
64 63
65 64
66 65
67 66
68 67
69 68
70 69
71 70
72 71
73 72
74 73
75 74
76 75
77 76
78 77
79 78
80 79
81 80
82 81
83 82
84 83
85 84
86 85
87 86
88 87
89 88
90 89
91 90
92 91
93 92
94 93
95 94
96 95
97 96
98 97
99 98
100 99
101 100
102 101
103 102
104 103
105 105
106 106
107 107
108 108
109 109
110 110
111 111
112 112
Читать дальше