This book presents Internet of Things (IoT) technology and security-related solutions that employ intelligent data processing technologies and machine learning (ML) approaches for data analytics. It presents practical scenarios from the industry for the application of the internet of things in various domains. Next Generation Communication Networks for Industrial Internet of Things Systems presents concepts and research challenges in communication networking for Industrial internet of things systems.
Features:
- Discusses process monitoring, environmental monitoring, control, and maintenance monitoring.
- Covers data collection and communication protocols in a comprehensive manner.
- Highlights the internet of things industrial applications, and industrial revolution 4.0.
- Presents 5G-enabled internet of things technology and architecture.
- Showcases artificial intelligence techniques in the IoT networks.
It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the areas of electrical engineering, electronics, and communications engineering, computer engineering, and information technology.
Author(s): Sundresan Perumal, Mujahid Tabassum, Moolchand Sharma, Saju Mohanan
Series: Future Generation Information Systems
Publisher: CRC Press
Year: 2022
Language: English
Pages: 239
City: Boca Raton
Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
About the Book
Editors
Contributors
Chapter 1: Fuzzy logic applications in healthcare: A review-based study
1.1 Introduction
1.1.1 Fuzzy logic
1.1.2 Structure of fuzzy logic
1.2 Applications of fuzzy logic techniques in medical domain
1.2.1 Neuro-fuzzy system
1.2.2 Fuzzy-based dynamic release of healthcare datasets
1.3 Internet of Things
1.3.1 IoT in healthcare
1.3.2 Internet of Things in monitoring the health
1.4 Implications and benefits of fuzzy logic in healthcare industry
1.5 A roadmap of fuzzy logic applications in healthcare
1.6 Some findings
1.7 Conclusion
1.8 Future scope
References
Chapter 2: A comparative study of certificate and certificate-less cryptographic algorithm and its energy consumption analysis in WSN
2.1 Introduction
2.2 Information about network security
2.2.1 Security in wireless sensor networks
2.2.2 Digital signatures in network security
2.2.3 ID-based encryption
2.2.4 Related work in wireless sensor network
2.3 Algorithm used
2.4 Implementation
2.4.1 ECC algorithm performed
2.4.2 RSA algorithm
2.4.3 Implementation of LEACH algorithm
2.4.4 Implementation of PEGASIS algorithm
2.5 Analysis
2.6 Conclusion
References
Chapter 3: A novel approach to indoor air quality monitoring by Cisco IoT-based toxic measurement system
3.1 Introduction
3.1.1 Affected criteria for indoor air quality
3.1.2 Leading carbon monoxide sources
3.1.3 Technological impact on Covid-19 pandemic
3.2 System measurements and problem
3.3 Specification and the measurements
3.4 Literature review
3.4.2 Indoor air pollution study: NO, CO, CO2
3.4.3 Indoor air quality and coronavirus disease
3.4.4 Indoor air quality: carbon monoxide and carbon dioxide (AEN 125)
3.5 Cisco Internet of Things based toxic measurement system
3.6 Methods of proposal
3.7 Experimental setup
3.8 Results and discussion
3.9 System performance analysis
3.10 Conclusion
References
Chapter 4: Babies’ movement detection and constant monitoring in the crib by using Internet of Things (IoT): Ultrasonic sensor
4.1 Introduction
4.2 Literature review
4.3 Background
4.3.1 Ultrasonic sensor
4.3.2 Breadboard
4.3.3 NodeMCU ESP8266
4.3.4 Temperature and humidity sensor (DHT11)
4.3.5 Blynk mobile application
4.3.6 RTSP IP camera application
4.4 Experimental set-up
4.4.1 Design of a transmitter
4.4.2 System flowchart
4.4.3 Design of receiver
4.5 Result and discussion
4.5.1 Simulation environment experiment
4.5.2 Real environment design
4.6 Conclusion and future work
Notes
References
Chapter 5: Cloud security still an unsolved puzzle: A complete overview
5.1 Introduction
5.2 Need for layered security
5.3 Attacks and vulnerabilities
5.4 Usage of blockchain in cloud
5.4.1 Consensus algorithm
5.5 Limitation of cloud computing
5.6 Comparative study of machine learning for cloud security
5.7 Conclusion
References
Chapter 6: A layered architecture for delay tolerant networks and routing mechanism
6.1 Introduction
6.2 A delay tolerant message-based overlay architecture
6.2.1 Regions and border gateways
6.2.2 Path selection and scheduling
6.3 Architecture of delay tolerant networks
6.3.1 Layer communication
6.3.2 Internal arrangement of border gateways
6.4 Conclusion
6.5 Future work
References
Chapter 7: A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices
7.1 Introduction
7.2 Related work
7.3 Definitions
7.3.1 Internet of things (IoT)
7.3.2 Architecture of Internet of Things
7.3.2.1 Perception layer
7.3.2.2 Network layer
7.3.2.3 Application layer
7.3.3 Resource-constrained Internet of Things devices
7.3.4 Elliptic curve cryptograph (ECC)
7.3.4.1 Point addition
7.3.4.2 Point subtraction
7.3.4.3 Point doubling
7.3.4.4 Scalar multiplication
7.3.4.5 Elliptic curve discrete logarithm problem (ECDLP)
7.3.5 Identity-based encryption (IBE)
7.4 Proposed scheme
7.4.1 Set-up phase
7.4.2 Things/device register phase
7.4.3 Mutual authentication phase
7.4.4 Message phase
7.5 Implementation of the proposed scheme
7.6 Security requirements
7.6.1 Privacy
7.6.2 Data integrity
7.6.3 Mutual authentication
7.6.4 Accessibility
7.6.5 Non-repudiation
7.6.6 Identity privacy
7.7 Security analysis
7.7.1 Mutual authentication
7.7.2 Privacy
7.7.3 Data integrity
7.7.4 Identity privacy
7.7.5 Non-repudiation
7.7.6 Forward security
7.7.7 Random oracle model security
7.8 Performance analysis
7.8.1 Computation cost analysis
7.8.2 Communication cost analysis
7.9 Conclusion
References
Chapter 8: Protocol stack in wireless sensor networks for IoT-based applications
8.1 Introduction
8.2 Communication protocols
8.2.1 Zigbee
8.2.2 Open source IPv6 automation network (OSIAN)
8.2.3 DASH7
8.2.4 Bluetooth low energy (Bluetooth LE)
8.2.5 Amazon sidewalk
8.2.6 Design issues in communication protocol
8.3 Medium access control protocols
8.3.1 Self-organizing medium access control for sensornets (SMACS)
8.3.2 Bluetooth
8.3.3 Low energy adaptive clustering hierarchy (LEACH)
8.3.4 Berkeley media access control (B-MAC)
8.3.5 Sensor media access control (S-MAC)
8.3.6 Design issues in MAC protocols
8.4 Routing protocols
8.4.1 Regular ad hoc network routing approaches
8.4.1.1 Proactive routing
8.4.1.2 Reactive routing
8.4.1.3 Hybrid routing
8.4.2 Wireless sensor network routing protocol approaches
8.4.2.1 Flat network system
8.4.2.2 Clustering system
8.4.2.3 Data-based protocols
8.4.2.4 Location-based protocols
8.4.3 Wireless sensor network routing techniques
8.4.3.1 Flooding
8.4.3.2 Gossiping
8.4.3.3 Sensor protocols for information via negotiation (SPIN)
8.4.3.4 Low energy adaptive clustering hierarchy
8.4.3.5 Design issues in routing protocols
8.5 Transmission control protocols
8.5.1 Traditional transmission control protocols
8.5.1.1 User datagram protocol
8.5.1.2 Transmission control protocol
8.5.2 Wireless sensor network transmission control protocols
8.5.2.1 Congestion detection and avoidance
8.5.2.2 Event-to-sink reliable transport
8.5.2.3 Reliable multi-segment transport
8.5.2.4 Pump slowly, fetch quickly
8.5.2.5 GARUDA
8.5.2.6 Ad hoc transport protocol
8.5.3 Design issues in transmission control protocols
8.6 IoT applications of wireless sensor networks
8.7 Conclusion
References
Chapter 9: Secure communication in Internet of Things devices using steganography
9.1 Introduction
9.1.1 Objectives of the paper
9.1.2 Overview of the proposed model
9.1.2.1 Sender side
9.1.2.2 Receiver side (Figures 9.5 and 9.6)
9.1.3 Proposed embedding and extraction algorithm
9.1.3.1 Rivest Shamir Adleman algorithm
9.1.3.2 Embedding algorithm
9.1.3.3 Extraction algorithm
9.2 Analysis
9.3 Conclusion
References
Chapter 10: Next-generation networks enabled technologies: Challenges and applications
10.1 Introduction
10.2 Architecture of next-generation network
10.2.1 Need for next-generation network
10.2.2 Features of next-generation network
10.3 Next-generation network enabling technologies
10.3.1 5G
10.3.2 Edge intelligence
10.3.3 Cloud-based Internet of Things
10.3.3.1 Importance of integrating cloud computing with Internet of Things network
10.3.4 Software-defined networks
10.4 Open research challenges and issues in next-generation network
10.4.1 Challenges and issues in 5G
10.4.2 Challenges and issues in edge intelligence
10.4.3 Challenges and issues in Cloud-based Internet of Things network
10.4.4 Challenges and issues in software-defined network
10.5 Applications
10.5.1 Intelligent healthcare
10.5.2 Supply chain management
10.5.3 Smart education
10.5.4 Intelligent disaster management system
10.6 Conclusion and future scope
References
Index