Secure and Smart Internet of Things (IoT) Using Blockchain and AI

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled.This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology.

Author(s): Ahmed Banafa
Publisher: River Publishers
Year: 2022

Language: English
Pages: 183
City: Gistrup

Cover
Half Title
Series
Title
Copyright
Table of Contents
Foreword
Preface
List of Figures
List of Abbreviations
PART I: What Is IoT?
1 Internet of Things: The Third Wave?
1.1 Advantages and Disadvantages of IoT
2 The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits
2.1 IIoT, IoT and M2M
2.1.1 IIoT Challenges
2.1.2 IIoT Requirements
2.1.3 IIoT Benefits
2.2 The Future of the Industrial Internet of Things
3 Internet of Things: Security, Privacy and Safety
3.1 IoT's Threats
3.2 Threats Are Real
3.3 What Can We Do
4 Internet of Things: More than Smart “Things”
4.1 Industrial Internet
4.2 The IoT Value Chain
4.3 Internet of Things Predictions
4.4 Challenges Facing IoT
5 Internet of Things: Myths and Facts
5.1 IoT and Sensors
5.2 IoT and Mobile Data
5.3 IoT and the Volume of Data
5.4 IoT and Datacenters
5.5 IoT Is a Future Technology
5.6 IoT and Current Interoperability Standards
5.7 IoT and Privacy & Security
5.8 IoT and Limited Vendors
5.9 Conclusion
PART II: IoT Implementation & Standardization Challenges
6 Three Major Challenges Facing IoT
6.1 Technology
6.2 Technological Challenges
6.3 Business
6.4 Society
6.5 Privacy
6.6 Regulatory Standards
7 IoT Implementation and Challenges
7.1 Components of IoT Implementation
7.1.1 Sensors
7.1.2 Networks
7.1.3 Standards
7.1.4 Intelligent Analysis
7.1.5 Intelligent Actions
8 IoT Standardization and Implementation Challenges
8.1 IoT Standardization
8.2 IoT Implementation
8.2.1 Sensors
8.2.2 Networks
8.2.3 Standards
8.2.4 Intelligent Analysis
8.2.5 Intelligent Actions
8.3 The Road Ahead
9 Challenges Facing IoT Analytics Success
9.1 Data Structures
9.2 Combining Multiple Data Formats
9.3 The Need to Balance Scale and Speed
9.4 IoT Analytics at the Edge
9.5 IoT Analytics and AI
PART III: Securing IoT
10 How to Secure the Internet of Things
10.1 Challenges to Secure IoT Deployments
10.2 Dealing with the Challenges and Threats
10.3 The Optimum Platform
10.4 Last Word
11 Using Blockchain to Secure IoT
11.1 Challenges to Secure IoT Deployments
11.2 Dealing with the Challenges and Threats
11.3 The Optimum Platform
11.4 Decentralizing IoT Networks
11.5 The Blockchain Approach
11.5.1 What Is Blockchain?
11.5.2 What Are Some Advantages of Blockchain?
11.5.3 How Does It Work?
11.6 The Blockchain and IoT
12 IoT and Blockchain: Challenges and Risks
12.1 The Blockchain Model
12.2 Principles of Blockchain Technology
12.3 Public vs. Private Blockchain
12.4 Challenges of Blockchain in IoT
12.5 Risks of Using Blockchain in IoT
12.6 The Optimum Secure IoT Model
13 DDoS Attack: A Wake-Up Call for IoT
13.1 Security Is Not the Only Problem
13.1.1 Security Concerns
13.1.2 Privacy Issues
13.1.3 Inter-Operatability Standard Issues
13.1.4 Legal Regulatory and Rights Issues
13.1.5 Emerging Economy and Development Issues
13.2 How to Prevent Future Attacks?
PART IV: AI, Fog Computing and IoT
14 Why IoT Needs Fog Computing
14.1 The Challenge
14.2 The Solution
14.3 Benefits of Using Fog Computing
14.4 Real-Life Example
14.5 The Dynamics of Fog Computing
14.6 Fog Computing and Smart Gateways
14.7 Conclusion
15 AI Is the Catalyst of IoT
15.1 Examples of IoT Data
15.2 AI and IoT Data Analysis
15.3 AI in IoT Applications
15.4 Challenges Facing AI in IoT
15.5 Conclusion
PART V: The Future of IoT
16 IoT, AI and Blockchain: Catalysts for Digital Transformation
16.1 Digital Transformation
16.2 Internet of Things (IoT)
16.3 Digital Transformation, Blockchain and AI
16.4 Conclusion
17 Future Trends of IoT
17.1 Trend 1 - Lack of Standardization Will Continue
17.2 Trend 2 - More Connectivity and More Devices
17.3 Trend 3 - “New Hope” for Security: IoT & Blockchain Convergence
17.4 Trend 4 - IoT Investments Will Continue
17.5 Trend 5 - Fog Computing Will Be More Visible
17.6 Trend 6 - AI & IoT Will Work Closely
17.7 Trend 7 - New IoT-as-a-Service (IoT-a-a-S) Business Models
17.8 Trend 8 - The Need for Skills in IoT's Big Data Analysis and AI Will Increase
PART VI: Inside Look at Blockchain
18 Myths about Blockchain Technology
18.1 Myth 1: The Blockchain Is a Magical Database in the Cloud
18.2 Myth 2: Blockchain Is Going to Change the World
18.3 Myth 3: Blockchain Is Free
18.4 Myth 4: There Is Only One Blockchain
18.5 Myth 5: The Blockchain Can be Used for Anything and Everything
18.6 Myth 6: The Blockchain Can be the Backbone of a Global Economy
18.7 Myth 7: The Blockchain Ledger Is Locked and Irrevocable
18.8 Myth 8: Blockchain Records Can Never be Hacked or Altered
18.9 Myth 9: Blockchain Can Only be Used in the Financial Sector
18.10 Myth 10: Blockchain Is Bitcoin
18.11 Myth 11: Blockchain Is Designed for Business Interactions Only
18.12 Myth 12: Smart Contracts Have the Same Legal Value as Regular Contracts
19 Cybersecurity & Blockchain
19.1 Implementing Blockchain in Cybersecurity
19.2 Advantages of Using Blockchain in Cybersecurity
19.2.1 Decentralization
19.2.2 Tracking and Tracing
19.2.3 Confidentiality
19.2.4 Fraud Security
19.2.5 Sustainability
19.2.6 Integrity
19.2.7 Resilience
19.2.8 Data Quality
19.2.9 Smart Contracts
19.2.10 Availability
19.2.11 Increase Customer Trust
19.3 Disadvantages of Using Blockchain in Cybersecurity
19.3.1 Irreversibility
19.3.2 Storage Limits
19.3.3 Risk of Cyberattacks
19.3.4 Adaptability Challenges
19.3.5 High Operation Costs
19.3.6 Blockchain Literacy
19.4 Conclusion
20 Future Trends of Blockchain
20.1 Blockchain Tracks
20.2 Blockchain Technology Future Trends
20.3 Blockchain Skills in Demand
20.4 Blockchain and Enterprise Applications
20.5 Blockchain and IoT Security
20.6 Blockchain and Zero-Trust Model
20.7 Final Words
References
Index
About the Author