|
Showing 1 - 16 of
16 matches in All Departments
Today, Internet of Things (IoT) is ubiquitous as it is applied in
practice in everything from Industrial Control Systems (ICS) to
e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities,
smart parking, healthcare, supply chain management and many more.
Numerous industries, academics, alliances and standardization
organizations make an effort on IoT standardization, innovation and
development. But there is still a need for a comprehensive
framework with integrated standards under one IoT vision.
Furthermore, the existing IoT systems are vulnerable to huge range
of malicious attacks owing to the massive numbers of deployed IoT
systems, inadequate data security standards and the
resource-constrained nature. Existing security solutions are
insufficient and therefore it is necessary to enable the IoT
devices to dynamically counter the threats and save the system.
Apart from illustrating the diversified IoT applications, this book
also addresses the issue of data safekeeping along with the
development of new security-enhancing schemes such as blockchain,
as well as a range of other advances in IoT. The reader will
discover that the IoT facilitates a multidisciplinary approach
dedicated to create novel applications and develop integrated
solutions to build a sustainable society. The innovative and fresh
advances that demonstrate IoT and computational intelligence in
practice are discussed in this book, which will be helpful and
informative for scientists, research scholars, academicians,
policymakers, industry professionals, government organizations and
others. This book is intended for a broad target audience,
including scholars of various generations and disciplines,
recognized scholars (lecturers and professors) and young
researchers (postgraduate and undergraduates) who study the legal
and socio-economic consequences of the emergence and dissemination
of digital technologies such as IoT. Furthermore, the book is
intended for researchers, developers and operators working in the
field of IoT and eager to comprehend the vulnerability of the IoT
paradigm. The book will serve as a comprehensive guide for the
advanced-level students in computer science who are interested in
understanding the severity and implications of the accompanied
security issues in IoT. Dr. Bharat Bhushan is an Assistant
Professor of Department of Computer Science and Engineering (CSE)
at School of Engineering and Technology, Sharda University, Greater
Noida, India. Prof. (Dr.) Sudhir Kumar Sharma is currently a
Professor and Head of the Department of Computer Science, Institute
of Information Technology & Management affiliated to GGSIPU,
New Delhi, India. Prof. (Dr.) Bhuvan Unhelkar (BE, MDBA, MSc, PhD;
FACS; PSM-I, CBAP (R)) is an accomplished IT professional and
Professor of IT at the University of South Florida,
Sarasota-Manatee (Lead Faculty). Dr. Muhammad Fazal Ijaz is working
as an Assistant Professor in Department of Intelligent Mechatronics
Engineering, Sejong University, Seoul, Korea. Prof. (Dr.) Lamia
Karim is a professor of computer science at the National School of
Applied Sciences Berrechid (ENSAB), Hassan 1st University.
Integration of IoT (Internet of Things) with big data and cloud
computing has brought forward numerous advantages and challenges
such as data analytics, integration, and storage. This book
highlights these challenges and provides an integrating framework
for these technologies, illustrating the role of blockchain in all
possible facets of IoT security. Furthermore, it investigates the
security and privacy issues associated with various IoT systems
along with exploring various machine learning-based IoT security
solutions. This book brings together state-of-the-art innovations,
research activities (both in academia and in industry), and the
corresponding standardization impacts of 5G as well. Aimed at
graduate students, researchers in computer science and engineering,
communication networking, IoT, machine learning and pattern
recognition, this book Showcases the basics of both IoT and various
security paradigms supporting IoT, including Blockchain Explores
various machine learning-based IoT security solutions and
highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially
concerned with IoT security Provides insights into the taxonomy of
challenges, issues, and research directions in IoT-based
applications Includes examples and illustrations to effectively
demonstrate the principles, algorithm, applications, and practices
of security in the IoT environment
The Internet has gone from an Internet of people to an Internet of
Things (IoT). This has brought forth strong levels of complexity in
handling interoperability that involves the integrating of wireless
sensor networks (WSNs) into IoT. This book offers insights into the
evolution, usage, challenges, and proposed countermeasures
associated with the integration. Focusing on the integration of
WSNs into IoT and shedding further light on the subtleties of such
integration, this book aims to highlight the encountered problems
and provide suitable solutions. It throws light on the various
types of threats that can attack both WSNs and IoT along with the
recent approaches to counter them. This book is designed to be the
first choice of reference at research and development centers,
academic institutions, university libraries, and any institution
interested in the integration of WSNs into IoT. Undergraduate and
postgraduate students, Ph.D. scholars, industry technologists,
young entrepreneurs, and researchers working in the field of
security and privacy in IoT are the primary audience of this book.
This new volume provides an informative collection of chapters on
ICT and data analytics in education, helping to lead the digital
revolution in higher education. The chapters emphasize skill
development through ICT, artificial intelligence in education,
policies for integrating ICT in higher education, and more. The
book focuses mainly on technological advancements in ICT in
education, the perceived role of ICT in the teaching-learning
transaction, pedagogy for teaching-learning in the 21st century,
student-centered learning based on ICT, learning analytics, online
technologies learning, tools for technology enhanced learning,
distance education and learning, the effective use of ICT in
management education, experiences in ICT for technology-enhanced
learning, influence of ICT in research development in higher
education, role of teachers in direct classroom teaching in
web-based education system, and role of ICT in innovation capacity
building. The case studies help to illustrate the ideas and
concepts discussed in the chapters.
The book aims to showcase the basics of both IoT and Blockchain for
beginners as well as their integration and challenge discussions
for existing practitioner. It aims to develop understanding of the
role of blockchain in fostering security. The objective of this
book is to initiate conversations among technologists, engineers,
scientists, and clinicians to synergize their efforts in producing
low-cost, high-performance, highly efficient, deployable IoT
systems. It presents a stepwise discussion, exhaustive literature
survey, rigorous experimental analysis and discussions to
demonstrate the usage of blockchain technology for securing
communications. The book evaluates, investigate, analyze and
outline a set of security challenges that needs to be addressed in
the near future. The book is designed to be the first reference
choice at research and development centers, academic institutions,
university libraries and any institutions interested in exploring
blockchain. UG/PG students, PhD Scholars of this fields, industry
technologists, young entrepreneurs and researchers working in the
field of blockchain technology are the primary audience of this
book.
The purpose of this edited book is to present and showcase the
basic fundamentals, applications, and integration of both IoT and
Blockchain. The trend of applying Blockchain to IoT is rapidly
growing because it helps to overcome various challenges faced by
IoT, from smart manufacturing to unmanned aerial vehicles. Thise
book aims to showcase the basics of both IoT and Blockchain as well
as the integration and challenges for existing practitioners. Thise
book initiates conversations among technologists, engineers,
scientists, and clinicians to synergize their efforts in producing
low-cost, high-performance, highly efficient, deployable IoT
systems. Thise book is theory-based and is useful for engineers
from various disciplines, including industrial engineering,
computer science, electronics, telecommunications, electrical,
agricultural, and cybersecurity, along with researchers,
professionals, and students.
This new volume provides an informative collection of chapters on
ICT and data analytics in education, helping to lead the digital
revolution in higher education. The chapters emphasize skill
development through ICT, artificial intelligence in education,
policies for integrating ICT in higher education, and more. The
book focuses mainly on technological advancements in ICT in
education, the perceived role of ICT in the teaching-learning
transaction, pedagogy for teaching-learning in the 21st century,
student-centered learning based on ICT, learning analytics, online
technologies learning, tools for technology enhanced learning,
distance education and learning, the effective use of ICT in
management education, experiences in ICT for technology-enhanced
learning, influence of ICT in research development in higher
education, role of teachers in direct classroom teaching in
web-based education system, and role of ICT in innovation capacity
building. The case studies help to illustrate the ideas and
concepts discussed in the chapters.
This book is a relevant reference for any readers interested in the
security aspects of Cyber-Physical Systems and particularly useful
for those looking to keep informed on the latest advances in this
dynamic area. Cyber-Physical Systems (CPSs) are characterized by
the intrinsic combination of software and physical components.
Inherent elements often include wired or wireless data
communication, sensor devices, real-time operation and automated
control of physical elements. Typical examples of associated
application areas include industrial control systems, smart grids,
autonomous vehicles and avionics, medial monitoring and robotics.
The incarnation of the CPSs can therefore range from considering
individual Internet-of-Things devices through to large-scale
infrastructures. Presented across ten chapters authored by
international researchers in the field from both academia and
industry, this book offers a series of high-quality contributions
that collectively address and analyze the state of the art in the
security of Cyber-Physical Systems and related technologies. The
chapters themselves include an effective mix of theory and applied
content, supporting an understanding of the underlying security
issues in the CPSs domain, alongside related coverage of the
technological advances and solutions proposed to address them. The
chapters comprising the later portion of the book are specifically
focused upon a series of case examples, evidencing how the
protection concepts can translate into practical application.
Blockchain Technology Solutions for the Security of IoT-Based
Healthcare Systems explores the various benefits and challenges
associated with the integration of blockchain with IoT healthcare
systems, focusing on designing cognitive-embedded data technologies
to aid better decision-making, processing and analysis of large
amounts of data collected through IoT. This book series targets the
adaptation of decision-making approaches under cognitive computing
paradigms to demonstrate how the proposed procedures, as well as
big data and Internet of Things (IoT) problems can be handled in
practice. Current Internet of Things (IoT) based healthcare systems
are incapable of sharing data between platforms in an efficient
manner and holding them securely at the logical and physical level.
To this end, blockchain technology guarantees a fully autonomous
and secure ecosystem by exploiting the combined advantages of smart
contracts and global consensus. However, incorporating blockchain
technology in IoT healthcare systems is not easy. Centralized
networks in their current capacity will be incapable to meet the
data storage demands of the incoming surge of IoT based healthcare
wearables.
This book is a relevant reference for any readers interested in the
security aspects of Cyber-Physical Systems and particularly useful
for those looking to keep informed on the latest advances in this
dynamic area. Cyber-Physical Systems (CPSs) are characterized by
the intrinsic combination of software and physical components.
Inherent elements often include wired or wireless data
communication, sensor devices, real-time operation and automated
control of physical elements. Typical examples of associated
application areas include industrial control systems, smart grids,
autonomous vehicles and avionics, medial monitoring and robotics.
The incarnation of the CPSs can therefore range from considering
individual Internet-of-Things devices through to large-scale
infrastructures. Presented across ten chapters authored by
international researchers in the field from both academia and
industry, this book offers a series of high-quality contributions
that collectively address and analyze the state of the art in the
security of Cyber-Physical Systems and related technologies. The
chapters themselves include an effective mix of theory and applied
content, supporting an understanding of the underlying security
issues in the CPSs domain, alongside related coverage of the
technological advances and solutions proposed to address them. The
chapters comprising the later portion of the book are specifically
focused upon a series of case examples, evidencing how the
protection concepts can translate into practical application.
Integration of IoT (Internet of Things) with big data and cloud
computing has brought forward numerous advantages and challenges
such as data analytics, integration, and storage. This book
highlights these challenges and provides an integrating framework
for these technologies, illustrating the role of blockchain in all
possible facets of IoT security. Furthermore, it investigates the
security and privacy issues associated with various IoT systems
along with exploring various machine learning-based IoT security
solutions. This book brings together state-of-the-art innovations,
research activities (both in academia and in industry), and the
corresponding standardization impacts of 5G as well. Aimed at
graduate students, researchers in computer science and engineering,
communication networking, IoT, machine learning and pattern
recognition, this book Showcases the basics of both IoT and various
security paradigms supporting IoT, including Blockchain Explores
various machine learning-based IoT security solutions and
highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially
concerned with IoT security Provides insights into the taxonomy of
challenges, issues, and research directions in IoT-based
applications Includes examples and illustrations to effectively
demonstrate the principles, algorithm, applications, and practices
of security in the IoT environment
This book presents high-quality, original contributions (both
theoretical and experimental) on Information Security, Machine
Learning, Data Mining and Internet of Things (IoT). It gathers
papers presented at ICETIT 2019, the 1st International Conference
on Emerging Trends in Information Technology, which was held in
Delhi, India, in June 2019. This conference series represents a
targeted response to the growing need for research that reports on
and assesses the practical implications of IoT and network
technologies, AI and machine learning, data analytics and cloud
computing, security and privacy, and next generation computing
technologies.
This book presents high-quality, original contributions (both
theoretical and experimental) on Information Security, Machine
Learning, Data Mining and Internet of Things (IoT). It gathers
papers presented at ICETIT 2019, the 1st International Conference
on Emerging Trends in Information Technology, which was held in
Delhi, India, in June 2019. This conference series represents a
targeted response to the growing need for research that reports on
and assesses the practical implications of IoT and network
technologies, AI and machine learning, data analytics and cloud
computing, security and privacy, and next generation computing
technologies.
Security and Privacy Issues in IoT Devices and Sensor Networks
investigates security breach issues in IoT and sensor networks,
exploring various solutions. The book follows a two-fold approach,
first focusing on the fundamentals and theory surrounding sensor
networks and IoT security. It then explores practical solutions
that can be implemented to develop security for these elements,
providing case studies to enhance understanding. Machine learning
techniques are covered, as well as other security paradigms, such
as cloud security and cryptocurrency technologies. The book
highlights how these techniques can be applied to identify attacks
and vulnerabilities, preserve privacy, and enhance data security.
This in-depth reference is ideal for industry professionals dealing
with WSN and IoT systems who want to enhance the security of these
systems. Additionally, researchers, material developers and
technology specialists dealing with the multifarious aspects of
data privacy and security enhancement will benefit from the book's
comprehensive information.
Fly ash can be used for reclaiming the problem soil and enhance the
crop productivity depending upon the nature of soil and fly ash.
Fly ash may improve the physical, chemical and biological
properties of problem soils and enhance the available macro and
micronutrients for plants. The high concentration of elements (K,
Na, Zn, Ca, Mg and Fe) in fly ash increase yield of agricultural
crops. However, application of fly ash, particularly unweathered
ones, shows a tendency of accumulating elements like B, Mo, Se and
Al. The accumulations of these elements to toxic levels are
responsible for reductions in the crop yields and consequently
influence animal and human health. This book explores the
possibility of using fly ash to improve the soil environment and
subsequently increase the growth and yield of crops.
|
|