The New Advanced Society

Здесь есть возможность читать онлайн «The New Advanced Society» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The New Advanced Society: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The New Advanced Society»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

THE NEW ADVANCED SOCIETY
Included in this book are the fundamentals of Society 5.0, artificial intelligence, and the industrial Internet of Things, featuring their working principles and application in different sectors. A 360-degree view of the different dimensions of the digital revolution is presented in this book, including the various industries transforming industrial manufacturing, the security and challenges ahead, and the far-reaching implications for society and the economy. The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. Finally, it can be understood that the social reformation of Society 5.0 will lead to a society where every person leads an active and healthy life. Audience
Sandeep Kumar Panda, PhD
Ramesh Kumar Mohapatra, PhD
Subhrakanta Panda, PhD
S. Balamurugan, PhD

The New Advanced Society — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The New Advanced Society», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM

Distributed Ledger implementation needs a basic platform namely a Blockchain. As the blockchain facilitates distributed database and essential characteristics of immutability, Distributed Ledger implementation can be done upon this platform efficiently. Blockchain as a technology can easily be integrated with access control and data sharing mechanisms. This way it may provide a new means for elimination of shortcomings of the age old traditional schemes. Blockchain provides solutions to many problems that are more effective to provide data integrity, fairness, authenticity, security, and distribution [21]. By virtue of the inherent cryptographic properties and decentralized storage and processing, as a technology Blockchain has been assessed as a suitable method for providing IAM services for IoT ecosystem as deliberated by the authors of [22, 23].

In any cryptographically secured system key management plays a vital role. In our proposed method Elliptic Curve Digital Signature Algorithm (ECDSA) may be conveniently used for generating public and private keys for the devices and the IoT clusters associated with Blockchain nodes. It provides the same level of security as with the RSA method. We have selected this approach depending upon a detailed comparison between encryption algorithms described by [24]. The ECDSA based program needs comparatively reduced power consumption from other similar methods. Hence it also suits the requirements of IoT infrastructure, keeping the constraint resources availability of the IoT devices.

Figure 3.4above represents a schematic diagram of the proposed Blockchain based IoT Cloud model for the IAM service implementation. Vital aspects of the proposed model are as follows.

1 (i) Establishment of an Ethereum-based private blockchain as a core of the distributed ledger network.

2 (ii) Device address and user Ids are mapped over the nodes of the blockchain.

3 (iii) Storage of the acquired data from the devices is done off the blockchain inn the cloud storage.

4 (iv) Use of multiple smart contracts for ensuring ‘user’ and ‘things’ mapping for effective service management as well as identity management.

5 (v) Use of blockchain consensus mechanism for verification of data access as a registered event logged in the blockchain

6 (vi) Use of cloud nodes for processing and relieving the edge devices from loading of processing due to their constrained resources availability.

7 (vii) Superimposing the IAM functionality of Cloud with the inherent advantages of blockchain related information security and event logging.

Figure 34 Proposed model of blockchainbased IoT Cloud for IAM 36 - фото 28

Figure 3.4 Proposed model of blockchain-based IoT Cloud for IAM.

3.6 Conclusion

Steadily the use of IoT devices is making ingress to our day to day lives affecting improvements towards our living conditions. It is quite evident to note that IoT is one of most prominent and emerging technologies in today’s scenario. The proliferation and application of IoT in all spheres of life is ever increasing for ease of life as well as efficient functioning of things. At the same time the value of sensitive data and its adverse effect to a fully functional IoT network is not hidden from anyone. It has been established in many researches that secured storage of data both in static and transit plays a vital role in the domain of information security. However as a new and emerging trend, the identity of entities of IoT as well as proper access management is emerging as a more crucial reason in the dynamics of information security matters. Accordingly, IAM is going to play a critically prominent role in future time to come.

Blockchain and distributed ledger empowered security technique have proved their significance as potential technology for tomorrow’s world. But there is a way forward for its effective application and wide acceptance as a decentralize approach based solution towards security of an IoT cloud. Gradual improvement in efficiency and the consensus algorithms used by blockchain, needs comparatively heavy computational loads to be addressed for its effective use. Thus without introducing significant overhead, the design of a less computation intensive consensus mechanism for resource constrained IoT devices cloud could be more pertinent for security solution empowered with blockchain and using distributed ledger based IoT ecosystems.

References

1. GSMA, IoT Security Guidelines for Endpoint Ecosystems , https://www.gsma.com/iot/iot-security-guidelines-for-endpoint-ecosystem/, Last accessed: 07 Nov 2020.

2. GSMA, IoT Security Guidelines for Network Operators , https://www.gsma.com/iot/iot-security-guidelines-for-network-operators/, Last accessed: 08 Nov 2020.

3. Miessler, D., Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10, in: RSA Conference , 2015.

4. Andersen, M.P., Kolb, J., Chen, K., Fierro, G., Culler, D.E., Popa, R.A., WAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts. Tech. Rep. , 2017.

5. Hussein, D., Bertin, E., Frey, V., A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag. , 55, 3, 146–153, 2017.

6. Aman, M.N., Chua, K.C., Sikdar, B., Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J. , 4, 5, 1327–1340, 017.

7. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. , 78, 943–955, 2018.

8. Gong, B., Zhang, Y., Wang, Y., A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener. Comput. Syst. , 78, 867–886, 2018.

9. Roychoudhury, P., Roychoudhury, B., Saikia, D.K., Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun. , 127, 146–157, 2018.

10. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A., Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. , 78, 126–142, 2018.

11. Feng, W., Qin, Y., Zhao, S., Feng, D., AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. , 134, 167–182, 2018.

12. Gope, P. and Sikdar, B., Lightweight and privacy-preserving two factor authentication scheme for IoT devices. IEEE Internet Things J. , 6, 580–589, 2019.

13. Cha, S.C., Chen, J.F. et al. , A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access , 6, 24639–24649, 2018.

14. Xiong, Z., Zhang, Y. et al. , When mobile blockchain meets edge computing. IEEE Commun. Mag. , 56, 8, 33–39, 2018.

15. Li, R., Song, T. et al. , Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. , 12, 5, 762–771, 2018.

16. Sharma, P.K., Chen, M., Park, J.H., A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access , 6, 115–124, 2018.

17. Manzoor, A., Liyanage, M. et al. , Blockchain based proxy re-encryption scheme for secure IoT data sharing, in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) , pp. 99–103, May 2019.

18. Lu, Y. and Li, J., A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. , 62, 140–147, 2016.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The New Advanced Society»

Представляем Вашему вниманию похожие книги на «The New Advanced Society» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The New Advanced Society»

Обсуждение, отзывы о книге «The New Advanced Society» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x