Trust-Based Communication Systems for Internet of Things Applications

Здесь есть возможность читать онлайн «Trust-Based Communication Systems for Internet of Things Applications» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Trust-Based Communication Systems for Internet of Things Applications: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Trust-Based Communication Systems for Internet of Things Applications»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS
Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.

Trust-Based Communication Systems for Internet of Things Applications — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Trust-Based Communication Systems for Internet of Things Applications», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

4. Nir Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT Professional, vol. 19, no. 4, pp. 68-72, May 2017, Available: http://ieeexplore.ieee.org/document/8012302/

5. Mahdi H. Miraz, Maaruf Ali, Peter Excell, and Picking Rich, “A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT),” in the Proceedings of the Fifth International IEEE Conference on Internet Technologies and Applications (ITA 15), Wrexham, UK, 2015, pp. 219–224.

6. Mahdi H. Miraz and Maaruf Ali, “Blockchain Enabled Enhanced IoT Ecosystem Security,” (accepted) in proceedings of the First International Conference on Emerging Technologies in Computing 2018 (iCETiC ‘18), London, UK, 23 August 2018.

7. Maaruf Ali and Mahdi H. Miraz, “Recent Advances in Cloud Computing Applications and Services,” International Journal on Cloud Computing (IJCC), vol. 1, no. 1, pp. 1-12, February 2014.

8. Xueping Liang et al ., “ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability,” in Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid ‘17), Madrid, Spain, May 14 - 17, 2017, pp. 468-477.

9. Sarah Underwood, “Blockchain Beyond Bitcoin,” Communications of the ACM, vol. 59, no. 11, pp. 15-17, November 2016, Available: https://doi.org/10.1145/2994581

10. D. Makrushin and V. Dashchenko, Fooling the ’Smart City’, Technical Report, Kaspersky Lab, pp. 1–22, Sep. 2016.

11. K. Christidis and M. Devetsikiotis, Blockchains and Smart Contracts for the IoTs, IEEE Access, Special section on the plethora of Research in IoT, pp. 2292–2303, 2016.

12. Christidis, Konstantinos, and Michael Devetsikiotis. “Blockchains and Smart Contracts for the Internet of Things.”

13. QiJing, Athanasios VVasilakos, JiafuWan, JingweiLu, and DechaoQiu.2014. Security of the internet of things: Perspectives and challenges. Wireless Networks 20, 8(2014), 2481–2501.

14. Ali Dorri, Salil S Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. In IEEE Percom workshop on security privacy and trust in the internet of thing. IEEE

15. Giacomo Brambilla, Michele Amoretti, and Francesco Zanichelli.2016. Using Blockchain for Peer-to-Peer Proof of Location. arXiv preprint arXiv:1607.00174 (2016).

16. Yves-Alexandre de Montjoye, Erez Shmueli, Samuel S Wang, and Alex Sandy Pentland.2014.openpds: Protecting the privacy of meta data through safe answers. PloS one 9,7(2014),e98790

17. Nakamoto, S., 2012. Bitcoin: A peer-to-peer electronic cash system, Oct,2008.

18. Wikipedia, “Blockchain”, https://en.wikipedia.org/wiki/Blockchain#cite_notete20151031-1.

19. CNNMoney “What is Bitcoin” http://money.cnn.com/infographic/technology/what-is-Bitcoin/

20. Wikipedia, “Bitcoin”, https://en.wikipedia.org/wiki/Bitcoin.

21. Vitalik Buterin, “Ethereum and The Decentralized Future”. Future Thinkers Podcast. 2015-04-21. Retrieved 2016-05-13.

22. Hyperledger, “About Hyperledger”, HTTPs://www.hyperledger.org/about.

23. Christian C., Elli A., Angelo De Caro, Andreas K., Mike O., Simon S., Alessandro S., Marko V,. et al , “Blockchain, cryptography, and consensus”, IBM Research Zurich, June 2017.

24. Ripple, “RippleNet”, https://ripple.com

25. Neelakandan, S & Paulraj, D 2020, ‘A gradient boosted decision tree-based sentiment classification of twitter data’, International Journal of Wavelets, Multiresolution and Information Processing, vol.18, no. 4, pp. 205027 1-21. DOI: https://doi.org/10.1142/S0219691320500277.

26. Neelakandan, S & Paulraj, D 2020, ‘An Automated Exploring And Learning Model For Data Prediction Using Balanced CA-Svm’, Journal of Ambient Intelligence and Humanized Computing, Vol.12, no.5, April 2020, DOI: https://doi.org/10.1007/s12652-020-01937-9.

27. Neelakandan, S, Annamalai, R., Rayen, S. J., & Arunajsmine, J. (2020). Social Media Networks Owing To Disruptions For Effective Learning. Procedia Computer Science, Vol. 172, pp. 145–151. doi:10.1016/j.procs.2020.05.022.

28. S. Neelakandan and J. Gokul Anand, “Trust based optimal routing in MANET’s,” 2011 International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 2011, pp. 1150-1156, doi: 10.1109/ICETECT.2011.5760293.

29. Neelakandan, S “Large scale optimization to minimize network traffic using MapReduce in big data applications”. International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), pp. 193-199, April 2016. DOI : 10.1109/ICCPEIC.2016.7557196.

30. Neelakandan, S & Paulraj, D 2020, ‘An Automated learning model of Conventional Neural Network based Sentiment Analysis on Twitter Data’, Journal of Computational and Theoretical Nano science. vol. 17, no. 5, pp. 2230-2236, May 2020. DOI : https://doi.org/10.1166/jctn.2020.8876.

31. Madhan E.S ,Neelakandan, S, R.Annamalai 2020, ‘A Novel Approach for Vehicle Type Classification and Speed Prediction Using Deep Learning’, Journal of Computational and Theoretical Nano science. vol. 17, no. 5, pp. 2237-2242, May 2020.DOI:10.1166/jctn.2020.8877.

32. Akshat Agrawal, Rajesh Arora, Ranjana Arora, Prateek Agrawal, “Applications of Artificial Intelligence and Internet of Things for Detection and Future to Fight against COVID-19”, A book on Emerging Technologies for battling COVID-19- Applications and Innovations, Feb 2021, Springer.

33. Vishu Madaan, Aditya Roy, Charu Gupta, Prateek Agrawal, Anand Sharma, Christian Bologa, Radu Prodan, “XCOVNet: Chest X-ray Image Classification for COVID-19 Early Diagnosis using Convolution Neural Networks”, New Generation Computing, Springer, 2021.

34. Prateek Agrawal, Deepak Chaudhary, Vishu Madaan, Anatoliy Zabrovskiy, Radu Prodan, Dragi Kimovski, Christian Timmerer, “Automated Bank Cheque Verification Using Image Processing and Deep Learning Methods”, Multimedia tools and applications (MTAP), 80(1), pp. 1-32.

1 *Corresponding author: prateek061186@gmail.com

3

IoT Protocol Security Mechanisms

D. Karthika* and Dr. K. Kalaiselvi†

Department of Computer Applications, School of Computing Science, Vels Institute of Science, Technology & Advanced Studies (Formerly Vels University), Chennai, Tamil Nadu, India

Abstract

The Internet of Things (IoT) is the development production of computer science and communication technology. In recent years, with the development of computer science, communication technology, and perception recognition technology, the network of things has made a great breakthrough. As IoT is broadly used in many fields, the security of IoT is becoming especially important and will have great effects on the industry of IoT. Current Internet security protocols rely on a well-known and widely trusted suite of cryptographic algorithms: the Rivest-Shamir-Adelman (RSA) asymmetric algorithm for digital signatures, the Diffie-Hellman (DH) asymmetric key agreement algorithm, the Advanced Encryption Standard (AES) block cipher for confidentiality, and the SHA1 and SHA-256 secure hash algorithms. This chapter will focus on security concerns, amongst other subjects, and IoT based on the Internet and web security problems are also mentioned. This description is articulated explicitly in different spaces by the protection of the Item Network. The security concerns of the IoT network are strongly connected to its overall application. The IoT can find applications in many fields from the earliest wireless sensor networks such as the smart grid, smart healthcare, smart agriculture, smart logistics, and so on with the suitable security mechanism.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Trust-Based Communication Systems for Internet of Things Applications»

Представляем Вашему вниманию похожие книги на «Trust-Based Communication Systems for Internet of Things Applications» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Trust-Based Communication Systems for Internet of Things Applications»

Обсуждение, отзывы о книге «Trust-Based Communication Systems for Internet of Things Applications» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x