Next Generation Communication Networks for Industrial Internet of Things Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book presents Internet of Things (IoT) technology and security-related solutions that employ intelligent data processing technologies and machine learning (ML) approaches for data analytics. It presents practical scenarios from the industry for the application of the internet of things in various domains. Next Generation Communication Networks for Industrial Internet of Things Systems presents concepts and research challenges in communication networking for Industrial internet of things systems.

Features:

    • Discusses process monitoring, environmental monitoring, control, and maintenance monitoring.

    • Covers data collection and communication protocols in a comprehensive manner.

    • Highlights the internet of things industrial applications, and industrial revolution 4.0.

    • Presents 5G-enabled internet of things technology and architecture.

    • Showcases artificial intelligence techniques in the IoT networks.

    It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the areas of electrical engineering, electronics, and communications engineering, computer engineering, and information technology.

    Author(s): Sundresan Perumal, Mujahid Tabassum, Moolchand Sharma, Saju Mohanan
    Series: Future Generation Information Systems
    Publisher: CRC Press
    Year: 2022

    Language: English
    Pages: 239
    City: Boca Raton

    Cover
    Half Title
    Series Page
    Title Page
    Copyright Page
    Dedication
    Table of Contents
    Preface
    About the Book
    Editors
    Contributors
    Chapter 1: Fuzzy logic applications in healthcare: A review-based study
    1.1 Introduction
    1.1.1 Fuzzy logic
    1.1.2 Structure of fuzzy logic
    1.2 Applications of fuzzy logic techniques in medical domain
    1.2.1 Neuro-fuzzy system
    1.2.2 Fuzzy-based dynamic release of healthcare datasets
    1.3 Internet of Things
    1.3.1 IoT in healthcare
    1.3.2 Internet of Things in monitoring the health
    1.4 Implications and benefits of fuzzy logic in healthcare industry
    1.5 A roadmap of fuzzy logic applications in healthcare
    1.6 Some findings
    1.7 Conclusion
    1.8 Future scope
    References
    Chapter 2: A comparative study of certificate and certificate-less cryptographic algorithm and its energy consumption analysis in WSN
    2.1 Introduction
    2.2 Information about network security
    2.2.1 Security in wireless sensor networks
    2.2.2 Digital signatures in network security
    2.2.3 ID-based encryption
    2.2.4 Related work in wireless sensor network
    2.3 Algorithm used
    2.4 Implementation
    2.4.1 ECC algorithm performed
    2.4.2 RSA algorithm
    2.4.3 Implementation of LEACH algorithm
    2.4.4 Implementation of PEGASIS algorithm
    2.5 Analysis
    2.6 Conclusion
    References
    Chapter 3: A novel approach to indoor air quality monitoring by Cisco IoT-based toxic measurement system
    3.1 Introduction
    3.1.1 Affected criteria for indoor air quality
    3.1.2 Leading carbon monoxide sources
    3.1.3 Technological impact on Covid-19 pandemic
    3.2 System measurements and problem
    3.3 Specification and the measurements
    3.4 Literature review
    3.4.2 Indoor air pollution study: NO, CO, CO2
    3.4.3 Indoor air quality and coronavirus disease
    3.4.4 Indoor air quality: carbon monoxide and carbon dioxide (AEN 125)
    3.5 Cisco Internet of Things based toxic measurement system
    3.6 Methods of proposal
    3.7 Experimental setup
    3.8 Results and discussion
    3.9 System performance analysis
    3.10 Conclusion
    References
    Chapter 4: Babies’ movement detection and constant monitoring in the crib by using Internet of  Things (IoT): Ultrasonic sensor
    4.1 Introduction
    4.2 Literature review
    4.3 Background
    4.3.1 Ultrasonic sensor
    4.3.2 Breadboard
    4.3.3 NodeMCU ESP8266
    4.3.4 Temperature and humidity sensor (DHT11)
    4.3.5 Blynk mobile application
    4.3.6 RTSP IP camera application
    4.4 Experimental set-up
    4.4.1 Design of a transmitter
    4.4.2 System flowchart
    4.4.3 Design of receiver
    4.5 Result and discussion
    4.5.1 Simulation environment experiment
    4.5.2 Real environment design
    4.6 Conclusion and future work
    Notes
    References
    Chapter 5: Cloud security still an unsolved puzzle: A complete overview
    5.1 Introduction
    5.2 Need for layered security
    5.3 Attacks and vulnerabilities
    5.4 Usage of blockchain in cloud
    5.4.1 Consensus algorithm
    5.5 Limitation of cloud computing
    5.6 Comparative study of machine learning for cloud security
    5.7 Conclusion
    References
    Chapter 6: A layered architecture for delay tolerant networks and routing mechanism
    6.1 Introduction
    6.2 A delay tolerant message-based overlay architecture
    6.2.1 Regions and border gateways
    6.2.2 Path selection and scheduling
    6.3 Architecture of delay tolerant networks
    6.3.1 Layer communication
    6.3.2 Internal arrangement of border gateways
    6.4 Conclusion
    6.5 Future work
    References
    Chapter 7: A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices
    7.1 Introduction
    7.2 Related work
    7.3 Definitions
    7.3.1 Internet of things (IoT)
    7.3.2 Architecture of Internet of Things
    7.3.2.1 Perception layer
    7.3.2.2 Network layer
    7.3.2.3 Application layer
    7.3.3 Resource-constrained Internet of Things devices
    7.3.4 Elliptic curve cryptograph (ECC)
    7.3.4.1 Point addition
    7.3.4.2 Point subtraction
    7.3.4.3 Point doubling
    7.3.4.4 Scalar multiplication
    7.3.4.5 Elliptic curve discrete logarithm problem (ECDLP)
    7.3.5 Identity-based encryption (IBE)
    7.4 Proposed scheme
    7.4.1 Set-up phase
    7.4.2 Things/device register phase
    7.4.3 Mutual authentication phase
    7.4.4 Message phase
    7.5 Implementation of the proposed scheme
    7.6 Security requirements
    7.6.1 Privacy
    7.6.2 Data integrity
    7.6.3 Mutual authentication
    7.6.4 Accessibility
    7.6.5 Non-repudiation
    7.6.6 Identity privacy
    7.7 Security analysis
    7.7.1 Mutual authentication
    7.7.2 Privacy
    7.7.3 Data integrity
    7.7.4 Identity privacy
    7.7.5 Non-repudiation
    7.7.6 Forward security
    7.7.7 Random oracle model security
    7.8 Performance analysis
    7.8.1 Computation cost analysis
    7.8.2 Communication cost analysis
    7.9 Conclusion
    References
    Chapter 8: Protocol stack in wireless sensor networks for IoT-based applications
    8.1 Introduction
    8.2 Communication protocols
    8.2.1 Zigbee
    8.2.2 Open source IPv6 automation network (OSIAN)
    8.2.3 DASH7
    8.2.4 Bluetooth low energy (Bluetooth LE)
    8.2.5 Amazon sidewalk
    8.2.6 Design issues in communication protocol
    8.3 Medium access control protocols
    8.3.1 Self-organizing medium access control for sensornets (SMACS)
    8.3.2 Bluetooth
    8.3.3 Low energy adaptive clustering hierarchy (LEACH)
    8.3.4 Berkeley media access control (B-MAC)
    8.3.5 Sensor media access control (S-MAC)
    8.3.6 Design issues in MAC protocols
    8.4 Routing protocols
    8.4.1 Regular ad hoc network routing approaches
    8.4.1.1 Proactive routing
    8.4.1.2 Reactive routing
    8.4.1.3 Hybrid routing
    8.4.2 Wireless sensor network routing protocol approaches
    8.4.2.1 Flat network system
    8.4.2.2 Clustering system
    8.4.2.3 Data-based protocols
    8.4.2.4 Location-based protocols
    8.4.3 Wireless sensor network routing techniques
    8.4.3.1 Flooding
    8.4.3.2 Gossiping
    8.4.3.3 Sensor protocols for information via negotiation (SPIN)
    8.4.3.4 Low energy adaptive clustering hierarchy
    8.4.3.5 Design issues in routing protocols
    8.5 Transmission control protocols
    8.5.1 Traditional transmission control protocols
    8.5.1.1 User datagram protocol
    8.5.1.2 Transmission control protocol
    8.5.2 Wireless sensor network transmission control protocols
    8.5.2.1 Congestion detection and avoidance
    8.5.2.2 Event-to-sink reliable transport
    8.5.2.3 Reliable multi-segment transport
    8.5.2.4 Pump slowly, fetch quickly
    8.5.2.5 GARUDA
    8.5.2.6 Ad hoc transport protocol
    8.5.3 Design issues in transmission control protocols
    8.6 IoT applications of wireless sensor networks
    8.7 Conclusion
    References
    Chapter 9: Secure communication in Internet of Things devices using steganography
    9.1 Introduction
    9.1.1 Objectives of the paper
    9.1.2 Overview of the proposed model
    9.1.2.1 Sender side
    9.1.2.2 Receiver side (Figures 9.5 and 9.6)
    9.1.3 Proposed embedding and extraction algorithm
    9.1.3.1 Rivest Shamir Adleman algorithm
    9.1.3.2 Embedding algorithm
    9.1.3.3 Extraction algorithm
    9.2 Analysis
    9.3 Conclusion
    References
    Chapter 10: Next-generation networks enabled technologies: Challenges and applications
    10.1 Introduction
    10.2 Architecture of next-generation network
    10.2.1 Need for next-generation network
    10.2.2 Features of next-generation network
    10.3 Next-generation network enabling technologies
    10.3.1 5G
    10.3.2 Edge intelligence
    10.3.3 Cloud-based Internet of Things
    10.3.3.1 Importance of integrating cloud computing with Internet of Things network
    10.3.4 Software-defined networks
    10.4 Open research challenges and issues in next-generation network
    10.4.1 Challenges and issues in 5G
    10.4.2 Challenges and issues in edge intelligence
    10.4.3 Challenges and issues in Cloud-based Internet of Things network
    10.4.4 Challenges and issues in software-defined network
    10.5 Applications
    10.5.1 Intelligent healthcare
    10.5.2 Supply chain management
    10.5.3 Smart education
    10.5.4 Intelligent disaster management system
    10.6 Conclusion and future scope
    References
    Index