The Smart Cyber Ecosystem for Sustainable Development

Здесь есть возможность читать онлайн «The Smart Cyber Ecosystem for Sustainable Development» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Smart Cyber Ecosystem for Sustainable Development: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Smart Cyber Ecosystem for Sustainable Development»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The Cyber Ecosystem can be a replica of our natural ecosystem where different living and non-living things interact with each other to perform specific tasks. Similarly, the different entities of the cyber ecosystem collaborate digitally with each other to revolutionize our lifestyle by creating smart, intelligent, and automated systems/processes. The main actors of the cyber ecosystem, among others, are the Internet of Things (IoT), Artificial Intelligence (AI), and the mechanisms providing cybersecurity.
This book documents how this blend of technologies is powering a digital sustainable socio-economic infrastructure which improves our life quality. It offers advanced automation methods fitted with amended business and audits models, universal authentication schemes, transparent governance, and inventive prediction analysis.

The Smart Cyber Ecosystem for Sustainable Development — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Smart Cyber Ecosystem for Sustainable Development», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Health Industry Grow IoTGadgets are being used by the medicinal services segments, and these segments will confront a consistent yet stable turn of events. Medical gadgets use the Cloud and put away the pictures for Intelligent Systems [31]. This will be something to note down that along these lines, the legislature will receive the best advantage in return [32]. We exceptionally empower the IoT trends in the healthcare world is high [33].

3.7 Discussion

New vulnerabilities, for example, unbound correspondence channels, malignant exercises in the system, and unbound physical gadgets, acquaint new kinds of dangers with the IoT systems [34]. This additionally confirms that IoT gadgets are the objectives of surface assaults because of their unpredictable fixing and updates: regularly, the gadgets accompany negligibly or possibly no confirmation or encryption by any means [35]. For the most part, these gadgets are sent in an antagonistic situation and accessible consistently; thus, there might be negligible assurance any unlawful physical access.

Affirmation and encryption may be convincing courses of action in lightening security issues in IoT [36]. For low-power, computationally, and resource obliged devices, the utilization of suitable affirmation and encryption is still in its most punctual stages and does not guarantee the evasion of noxious center points in the framework, for instance, contaminated contraptions or machines. In view of its solace, producers apply hard-coded accreditations or passwords.

It normally prompts a critical confirmation disappointment. From this overview, it is seen that ebb and flow research on gadgets’ security has for the most part focussed on improving lightweight confirmation and encryption for low-force and asset compelled gadgets.

On the other hand, ensuring about the guiding show at the framework layer and executing trust and reputation-based malicious center point area bears an all the way delay, correspondence overhead, and a high counterfeit positive rate.

The disclosures from this examination show that although check alone may not be satisfactory for IoT security, the example of IoT security instruments is to go after lightweight, normal, and multifaceted affirmation, especially at the framework and application layers. To facilitate contraptions’ security issues, lightweight and insignificant exertion encryption are proposed for the physical layer.

Considering, as appeared by the IoT security structure, security balance remembers all the layers for the key IoT building, explicitly, wisdom, framework, and application, although it is seen that most by far of the current segments apply to the framework layer. It also can be gathered that a fitting IoT peril showing might be important in arranging fascinating IoT security control.

3.8 Conclusion

Web of Things depends upon the Internet and sensors advancement which make correspondence possible among devices by realizing original shows. After doing the composing study, we talked about some critical issues like the meddled with accessibility among contraptions affecting the correspondence. In like manner, there is a comparability issue with devices. The security of contraptions during the correspondence technique and security of the correspondence channels or associations is in like manner a critical issue. Lots of work is to be practiced for the headway and progress of this field; still, there is more work to do, more standardization of development, shows, and hardware is required to make the reliable and secure space of the IoT. What is to come is depending upon the IoT, so a lot of exercises at the execution level.

References

1. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M., Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials , 17, 2347–2376, 2015.

2. Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S. et al ., Building the internet of things using rfid the rfid ecosystem experience. IEEE Internet Comput ., 13, 48–55, 2009.

3. Chen, H.C., Faruque, M.A.A., Chou, P.H., Security and privacy challenges in IoT-based machine-to-machine collaborative scenarios. 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) , Pittsburgh, PA, pp. 1–2, 2016.

4. Miao, W., Ting, L., Fei, L., ling, S., Hui, D., Research on the architecture of Internet of things. IEEE International Conference on Advanced Computer Theory and Engineering (ICACTE) , Sichuan province, China, pp. 484–487, 2010.

5. Parashar, R. and Abid Khan, N., A survey: the Internet of Things. Int. J. Tech. Res. Appl ., 4, 3, 251–257, May-June, 2016.

6. Li, W., Song, H., Zeng, F., Policy based Secure and Trustworthy Sensing for Internet of Things in Smart Cities. IEEE Internet Things J ., 2017.

7. Sha, K., Wei, W., Andrew Yang, T., Wang, Z., Shi, W., On security challenges and open issues in Internet of Things. Futur. Gener. Comput. Syst ., 83, 326–337, 2018.

8. Chernyshev, M., Baig, Z., Bello, O., Zeadally, S., IEEE Internet of Things (IoT): Research. 5, 3, 1637–1647, 2018.

9. RiahiSfar, A., Natalizio, E., Challal, Y., Chtourou, Z., A roadmap for security challenges in the Internet of Things. Digit. Commun. Networks , 4, 2, 118–137, 2018.

10. Srinivas, J., Mukhopadhyay, S., Mishra, D., Ad Hoc Networks Secure and efficient user authentication scheme for multi gateway wireless sensor networks. Ad Hoc Networks , 54, 147–169, 2017.

11. Giuliano, R., Mazzenga, F., Neri, A., Vegni, A.M., Member, S., Security Access Protocols in IoT Capillary Networks, in: IEEE Internet of Things Journal , 4, 3, 645–657, 2017.

12. Elgenaidi, W., Rao, M., Dooly, G., Toal, D., Sensors and Actuators A: Physical A secure end-to-end IoT solution. Sensors Actuators A. Phys ., 263, 291–299, 2017.

13. Choi, S., Yang, C., Kwak, J., System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. 12, 2, 906–918, 2018.

14. Singh, S., Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humaniz. Comput ., 0, 0, 0, 2017.

15. Shin, D., Sharma, V., Kim, J., Kwon, S., You, I., Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks. IEEE Access , 5, 11100–11117, 2017.

16. Shin, D., Sharma, V., Kim, J., Kwon, S., You, I., Member, S., Secure and Efficient Protocol for Route Optimization in PMIPv6 - Based Smart Home IoT Networks, in: IEEE Access , 5, pp. 11100–11117, 2017.

17. Agrawal, S. and Vieira, D., A survey on Internet of Things. Abakós, Belo Horizonte , 1, 2, 78 – 95, maio 2013.

18. Muriel, D. and Juan, F., Expanding the learning environment: combining physicality and virtuality The Internet of Things for eLearning. IEEE International Conference on Advanced Learning Technologies (ICALT) , Sousse, Tunisia, pp. 730–731, 2010.

19. Pande, P. and Padwalkar, A.R., Internet of Things –A Future of Internet: A Survey. Int. J. Adv. Res. Comput. Sci. Manage. Stud. Res. Article / Paper / Case Study , 2, 2, 354 – 361, February 2014.

20. Riazul Islam, S., Kwak, D., Humaun Kabir, M., Hossain, M., Kwak, K.S., The internet of things for healthcare: a comprehensive survey. IEEE Access , 3, 678–708, 2015.

21. Zhang, H. and Zhu, L., Internet of Things: Key technology, architecture and challenging problems. 2011 IEEE International Conference on Computer Science and Automation Engineering , Shanghai, pp. 507–512, 2011.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Smart Cyber Ecosystem for Sustainable Development»

Представляем Вашему вниманию похожие книги на «The Smart Cyber Ecosystem for Sustainable Development» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Smart Cyber Ecosystem for Sustainable Development»

Обсуждение, отзывы о книге «The Smart Cyber Ecosystem for Sustainable Development» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x