Trust-Based Communication Systems for Internet of Things Applications

Здесь есть возможность читать онлайн «Trust-Based Communication Systems for Internet of Things Applications» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Trust-Based Communication Systems for Internet of Things Applications: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Trust-Based Communication Systems for Internet of Things Applications»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS
Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.

Trust-Based Communication Systems for Internet of Things Applications — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Trust-Based Communication Systems for Internet of Things Applications», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Conclusion

Low-performance remote communications are used based on WSN system specifications and software requirements and must closely match the approved capabilities with minimal characteristics for the transition of applications. The fact that numerous studies nowadays aim to secure WSN capital is being studied as an inspiration for security in the network’s convergence with low-power WSN in view of its IoT engagement. All sorts of obstacles occur for the extraordinary expertise of the IoT. This chapter focuses on security concerns amongst other subjects and IoT based on the Internet and web security problems are also mentioned in IoT. This description is articulated explicitly in different spaces by the protection of the Item Network. The protection concerns of the IoT network are strongly connected to its overall application.

References

1. Jing, Q., Vasilakos, A.V., Wan, J. et al . Security of the Internet of Things: perspectives and challenges. Wireless Netw 20, 2481–2501 (2014).

2. K. Zhao and L. Ge, “A Survey on the Internet of Things Security,” 2013 Ninth International Conference on Computational Intelligence and Security , Leshan, 2013, pp. 663-667, doi: 10.1109/CIS.2013.145.

3. Deebak, B. D., and Fadi Al-Turjman. “A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks.” Ad Hoc Networks 97 (2020): 102022.

4. Santos-González, Iván, Alexandra Rivero-García, Mike Burmester, Jorge Munilla, and Pino Caballero-Gil. “Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.” Information Systems 88 (2020): 101423.

5. Wang, G., B. Lee, J. Ahn, and G. Cho. “A UAV-assisted CH election framework for secure data collection in wireless sensor networks.” Future Generation Computer Systems 102 (2020): 152-162.

6. Jha, Suresh Kumar, Niranjan Panigrahi, and Anil Gupta. “Security Threats for Time Synchronization Protocols in the Internet of Things.” In Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm, pp. 495-517. Springer, Cham, 2020.

7. Tewari, Aakanksha, and Brij B. Gupta. “Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags.” International Journal on Semantic Web and Information Systems (IJSWIS) 16, no. 3 (2020): 20-34.

8. Julie, E. Golden, and Y. Harold Robinson. “Security and Privacy Issues in Wireless Sensor Networks.” In IoT and Analytics for Agriculture, pp. 187-210. Springer, Singapore, 2020.

9. Siddiqui, Shams Tabrez, Shadab Alam, Riaz Ahmad, and Mohammed Shuaib. “Security Threats, Attacks, and Possible Countermeasures in Internet of Things.” In Advances in Data and Information Sciences, pp. 35-46. Springer, Singapore, 2020.

10. Das, Santosh Kumar, Sourav Samanta, Nilanjan Dey, and Rajesh Kumar. Design Frameworks for Wireless Networks. Springer, 2020. Mahdavinejad, Mohammad & Rezvan, Mohammadreza & Barekatain, Mohammadamin & Adibi, Peyman & Barnaghi, Payam & Sheth, Amit. “Machine learning for Internet of Things data analysis: A survey. Digital Communications and Networks”. (2017). 10.1016/j.dcan.2017.10.002.

11. Ullo, Silvia Liberata, and G. R. Sinha. “Advances in Smart Environment Monitoring Systems Using IoT and Sensors.” Sensors 20.11 (2020): 3113.

12. Qolomany, Basheer, et al . “Leveraging machine learning and big data for smart buildings: A comprehensive survey.” IEEE Access 7 (2019): 90316-90356.

13. Desarkar, Anindita, and Ajanta Das. “Big-Data Analytics, Machine Learning Algorithms and Scalable/Parallel/Distributed Algorithms.” Internet of Things and Big Data Technologies for Next Generation Healthcare. Springer, Cham, 2017. 159-197.

14. Tam, Wai Cheong, Thomas Cleary, and Eugene Yujun Fu. “Generating Synthetic Sensor Data to Facilitate Machine Learning Paradigm for Prediction of Building Fire Hazard.” Suppression, Detection and Signaling Research and Applications Symposium (2019 SUPDET). 2019.

15. Adi, Erwin, et al . “Machine learning and data analytics for the IoT.” Neural Computing and Applications (2020): 1-29.

16. Yigitcanlar, Tan, et al . “Contributions and risks of artificial intelligence (AI) in building smarter cities: Insights from a systematic review of the literature.” Energies 13.6 (2020): 1473.

17. Yaqoob, Ibrar, et al . “Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges.” Future Generation Computer Systems 92 (2019): 265-275.

18. A. Sheth, Transforming big data into smart data: Deriving value via harnessing volume, variety, and velocity using semantic techniques and technologies, in: Data Engineering (ICDE), 2014 IEEE 30th International Conference on, IEEE, 2014, pp. 2–2.

19. Shinde, D.; Siddiqui, N. IOT Based Environment change Monitoring Controlling in Greenhouse using WSN. In Proceedings of the 2018 International Conference on Information, Communication, Engineering and Technology (ICICET 2018), Pune, India, 29–31 August 2018; pp. 1–5.

20. Pathak, A.; Uddin, M.A.; Jainal Abedin, M.; Andersson, K.; Mustafa, R.; Hossain, M.S. IoT based smart system to support agricultural parameters: A Case Study. Procedia Comput. Sci. 2019,155,648–653.

21. Hosseini, M.; McNairn, H.; Mitchell, S.; Davidson, A.; Robertson, L.D. Comparison of Machine Learning Algorithms and Water Cloud Model for Leaf Area Index Estimation Over Corn Fields. In Proceedings of the IGARSS 2019 - 2019 IEEE Int. Geosci. Remote Sens. Symp, Yokohama, Japan, 28 July–2 August 2019; pp. 6267–6270.

22. Fazai, R.; Mansouri, M.; Abodayeh, K.; Puig, V.; Selmi, M.; Nounou, H.; Nounou, M. Multiscale Gaussian Process Regression-Based GLRT for Water Quality Monitoring. Conf. Control Fault Toler. Syst. Sys. Tol. 2019, 44–49. [CrossRef].

23. Dimitriadis, S.; Goumopoulos, C. Applying machine learning to extract new knowledge in precision agriculture applications. In Proceedings of the 12th Pan-Hellenic Conference on Informatics Doryssa Seaside Resort (PCI 2008), Samos Island, Greece, 28–30 August 2008; pp. 100–104.

24. Y. Wang, W. Lin, T. Zhang, and Y. Ma, “Research on application and security protection of internet of things in smart grid,” pp. 1–5, Dec 2012.

25. A.-M. Rahmani, N. Thanigaivelan, T. N. Gia, J. Granados, B. Negash, P. Liljeberg, and H. Tenhunen, “Smart e-health gateway: Bringing intelligence to internet-of-things based ubiquitous healthcare systems,” in Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE, Jan 2015, pp. 826–834.

26. Jain, B.; Brar, G.; Malhotra, J.; Rani, S.; Ahmed, S.H. A cross layer protocol for traffic management in Social Internet of Vehicles. Future Gen. Comput. Syst. 2018, 82, 707–714. [CrossRef]

27. Ghosh, A.; Chatterjee, T.; Samanta, S.; Aich, J.; Roy, S. Distracted Driving: A Novel Approach towards Accident Prevention. Adv. Comput. Sci. Technol. 2017, 10, 2693–2705.

28. Sharifinejad, Maedeh, Ali Dorri, and Javad Rezazadeh. “BIS-A Blockchainbased Solution for the Insurance Industry in Smart Cities.” arXiv preprint arXiv:2001.05273 (2020).

29. C. Cecchinel, M. Jimenez, S. Mosser, M. Riveill, An architecture to support the collection of big data in the internet of things, in: 2014 IEEE World Congress on Services, IEEE, 2014, pp. 442–449.

30. A. Sheth, Internet of things to smart iot through semantic, cognitive, and perceptual computing, IEEE Intelligent Systems 31 (2) (2016) 108–112.

31. S. Bin, L. Yuan, W. Xiaoyi, Research on data mining models for the internet of things, in: 2010 International Conference on Image Analysis and Signal Processing, IEEE, 2010, pp. 127–132.

32. F. Chen, P. Deng, J. Wan, D. Zhang, A. V. Vasilakos, X. Rong, Data mining for the internet of things: literature review and challenges, International Journal of Distributed Sensor Networks 2015 (2015) 12.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Trust-Based Communication Systems for Internet of Things Applications»

Представляем Вашему вниманию похожие книги на «Trust-Based Communication Systems for Internet of Things Applications» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Trust-Based Communication Systems for Internet of Things Applications»

Обсуждение, отзывы о книге «Trust-Based Communication Systems for Internet of Things Applications» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x