Mohamed-Aymen Chalouf - Intelligent Security Management and Control in the IoT

Здесь есть возможность читать онлайн «Mohamed-Aymen Chalouf - Intelligent Security Management and Control in the IoT» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Security Management and Control in the IoT: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Security Management and Control in the IoT»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and network access, the management of service quality and energy consumption, and the implementation of security mechanisms dedicated to the IoT.<br /><br />In response to these issues, this book presents new solutions for the management and control of performance and security in the IoT. The originality of these proposals lies mainly in the use of intelligent techniques. This notion of intelligence allows, among other things, the support of object heterogeneity and limited capacities as well as the vast dynamics characterizing the IoT.

Intelligent Security Management and Control in the IoT — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Security Management and Control in the IoT», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

3 Chapter 3Figure 3.1. The four visions of the IoT (Akinyoade and Eluwole 2019)Figure 3.2. Cloud, Fog and Edge. For a color version of this figure, see www.ist...Figure 3.3. Features for spectrum management in intelligent radio. For a color v...Figure 3.4. Integration of multiple technologies in the IoT. For a color version...

4 Chapter 4Figure 4.1. Architecture of the Internet of Things (Khalil et al. 2018). For a c...Figure 4.2. MAPE-K Control loopFigure 4.3. MAPE-K loop from the IoT energy self-optimization framework. For a c...Figure 4.4. Membership functions of the “distance” parameter. For a color versio...Figure 4.5. Membership functions of the “residual energy” parameter. For a color...Figure 4.6. Membership functions of the “precision” parameter. For a color versi...Figure 4.7. Membership functions of the output parameter. For a color version of...Figure 4.8. Decision-making algorithmFigure 4.9. Lifespan of the IoT system for scenarios 1 and 2Figure 4.10. Lifespan of the IoT system for scenario 3Figure 4.11. Average precision of the information recorded in scenario 4. For a ...Figure 4.12. Selection of IoT objects over time in scenario 4. For a color versi...

5 Chapter 5Figure 5.1. Example of star topology and mesh topology in an IoT network. For a ...Figure 5.2. Example of a size 6 slotframe, for a 4-node network and a coordinato...Figure 5.3. Example of TSCH schedule and topology showing Replication, Overheari...

6 Chapter 6Figure 6.1. Architecture of an energy-harvesting sensor node. For a color versio...Figure 6.2. Energy buffer thresholds. For a color version of this figure, see ww...Figure 6.3. Periodic execution of the EM. For a color version of this figure, se...Figure 6.4. Architecture of energy managers with and without prediction. For a c...Figure 6.5. Fuzzyman architectureFigure 6.6. Membership functions used by the fuzzing unitFigure 6.7. Performance of Fuzzyman and P-FREEN depending on P AVGfor different ...Figure 6.8. Global RLMan architecture. For a color version of this figure, see w...Figure 6.9. Average packet generation rate and energy efficiency depending on th...Figure 6.10. Architecture of harvesting multisource energy for LoRa standard. Fo...Figure 6.11. Performance of different EMs over 7 days of execution. For a color ...

7 Chapter 7Figure 7.1. XACML components and modules (XACML 2019)Figure 7.2. Integrating XACML and SAML (OASIS 2019c)Figure 7.3. Security architecture for the Internet of Things. For a color versio...Figure 7.4. IoT access control environment. For a color version of this figure, ...Figure 7.5. IoT-MAAC-MAAC access control architecture. For a color version of th...Figure 7.6. DPS notation system. For a color version of this figure, see www.ist...Figure 7.7. DSL notation system. For a color version of this figure, see www.ist...Figure 7.8. DOT notation system. For a color version of this figure, see www.ist...Figure 7.9. DPS, DSL and DOT membership functions. For a color version of this f...Figure 7.10. IoT-MAAC decision-making algorithm. For a color version of this fig...Figure 7.11. SAML assertion of the IoT object. For a color version of this figur...Figure 7.12. XACML authorization request from the LL-Gw in IoT-MAAC. For a color...Figure 7.13. XACML response from the HL-Gw in IoT-MAAC. For a color version of t...

8 Chapter 8Figure 8.1. Biometric techniques (Cabra et al. 2018)Figure 8.2. The evolution of authentication methods from simple authentication t...Figure 8.3. Registration phase of Sammoud et al. (2020c). For a color version of...Figure 8.4. Login phase of Sammoud et al. (2020c). For a color version of this f...Figure 8.5. a) Authentication phase of Sammoud et al. (2020c); b) Protocol authe...Figure 8.6. An ECG sequence (Sammoud et al. 2020a). For a color version of this ...Figure 8.7. Overall structure of an authentication system based on ECGFigure 8.8. Acquiring an ECG signal. For a color version of this figure, see www...

9 Chapter 9Figure 9.1. Blockchain architecture (Che et al. 2019). For a color version of th...Figure 9.2. a) Traditional intelligent identity and access management; b) Blockc...

10 Chapter 10Figure 10.1. Lifecycle of a context. For a color version of this figure, see www...Figure 10.2. Example of implementing context-aware security (Sylla et al. 2021).Figure 10.3. CASPaaS architecture (Sylla et al. 2020). For a color version of th...

11 Chapter 11Figure 11.1. Number of scientific publications per year with “Moving Target Defe...Figure 11.2. MTD taxonomies and network layers (with a reference to the section ...Figure 11.3. Components of the proposed MTD framework. For a color version of th...

Guide

1 Cover

2 Table of Contents

3 Title Page SCIENCES Networks and Communications , Field Director – Guy Pujolle Network Management and Control , Subject Head – Francine Krief

4 Copyright First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2022 The rights of Mohamed-Aymen Chalouf to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group. Library of Congress Control Number: 2022931274 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78945-053-8 ERC code: PE7 Systems and Communication Engineering PE7_1 Control engineering PE7_8 Networks (communication networks, sensor networks, networks of robots, etc.)

5 Begin Reading

6 List of Authors

7 Index

8 End User License Agreement

Pages

1 v

2 iii

3 iv

4 1

5 2

6 3

7 4

8 5

9 6

10 7

11 8

12 9

13 10

14 11

15 12

16 13

17 14

18 15

19 16

20 17

21 18

22 19

23 20

24 21

25 22

26 23

27 24

28 25

29 27

30 28

31 29

32 30

33 31

34 32

35 33

36 34

37 35

38 36

39 37

40 38

41 39

42 40

43 41

44 42

45 43

46 44

47 45

48 46

49 47

50 48

51 49

52 50

53 51

54 52

55 53

56 54

57 55

58 57

59 58

60 59

61 60

62 61

63 62

64 63

65 64

66 65

67 66

68 67

69 68

70 69

71 70

72 71

73 72

74 73

75 74

76 75

77 76

78 77

79 78

80 79

81 80

82 81

83 82

84 83

85 84

86 85

87 86

88 87

89 88

90 89

91 90

92 91

93 92

94 93

95 94

96 95

97 96

98 97

99 98

100 99

101 100

102 101

103 102

104 103

105 105

106 106

107 107

108 108

109 109

110 110

111 111

112 112

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Security Management and Control in the IoT»

Представляем Вашему вниманию похожие книги на «Intelligent Security Management and Control in the IoT» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Security Management and Control in the IoT»

Обсуждение, отзывы о книге «Intelligent Security Management and Control in the IoT» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x