𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Data Security in Internet of Things Based RFID and WSN Systems Applications

✍ Scribed by Korhan Cengiz, Rohit Sharma, Rajendra Prasad Mahapatra


Publisher
CRC Press
Year
2020
Tongue
English
Leaves
129
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1 An Intelligent and Optimistic Disease Diagnosis: An IoT-Based Smart City Paradigm
1.1 Introduction
1.2 Relative Work
1.3 Overview of IoT
1.3.1 Architecture of IoT in the Context of Communication Network
1.3.1.1 Application Layer
1.3.1.2 Service Support and Application Support Layer
1.3.1.3 Network Layer
1.3.1.4 Device Layer
1.4 Application of IoT in the Context of Commercial View
1.4.1 Medical and Healthcare
1.4.2 Transportation
1.4.3 V2X Communications
1.4.4 Agriculture
1.4.5 Energy Management
1.4.6 Living Lab
1.4.7 Internet of Battlefield Things
1.4.8 Ocean of Things
1.5 Proposed Model
1.6 Mathematical Treatment
1.6.1 Statistical Approach
1.6.2 Fuzzy Reasoning
1.6.3 Fuzzy Rules Set
1.6.4 Proposed Algorithm
1.6.5 Data Preparation
1.7 Results and Discussion
1.8 Conclusion
References
Chapter 2 Soft Computing Techniques for Boolean Function and Reliability-Based Approach of Blood Bank Supply Chain Management with Distribution Center Using Vector-Evaluated Genetic Algorithm
2.1 Role of β€œMathematics” in Blood Bank Supply Chain Inventory Models
2.2 Blood Collection and Processing
2.3 Genetic Algorithm
2.4 Literature Review
2.5 Blood Supply Chain
2.6 β€œBoolean Function Approach for Reliability” of Blood Banks
2.7 Formulation of the Model
2.8 Simulation
2.9 Conclusion
References
Chapter 3 Synthesis and Design of Energy- and Power-Efficient IoT-Enabled Smart Park
3.1 Introduction
3.2 Related Work
3.3 Problem Formulation
3.4 System Overview
3.4.1 Limitation of Existing Solution
3.4.2 Implementation
3.5 Interfacing of NuttyFi/ESP8266 with Analog Sensor
3.6 Description of Interfacing of ESP8266 with Variable Resistor
3.7 Program to Interface Variable Resistor with ESP8266
3.8 Conclusion
References
Chapter 4 Machine Learning Security Allocation in IoT using Raspberry Pi
4.1 Introduction
4.1.1 Internet of Things Security Challenges in Application Layer
4.1.2 Artificial Intelligence Using Machine Learning IoT
4.1.3 Artificial Intelligence and Machine Learning for Video Surveillance
4.1.4 How Can Improve Your Artificial Intelligence Security System
4.1.5 Smart Security Cameras
4.1.6 Smart Locks Framework with Machine Learning
4.1.7 Raspberry Pi
4.1.8 Raspberry Pi Models and Fundamental PC
4.1.9 Features of Raspberry Pi
4.1.10 How Raspberry Pi Can Be Used for Machine Learning Applications
4.1.11 Raspberry Pi Meets Machine Learning
4.1.11.1 Tensor Flow
4.1.11.2 Google AIY Kit
4.1.11.3 Image Sorting
4.1.11.4 Others
4.1.12 Where Do They Lack?
4.2 Existing Technologies and Its Review
4.3 Applications of Artificial Intelligence or Machine Learning in the Proposed Area
4.3.1 Proposed Algorithm or Methodology for Making Machine Intelligent
4.3.2 Implementation Results and Discussion
4.3.2.1 Steganography Algorithm
4.3.2.2 Artificial Neural Network Algorithm
4.4 Findings with Outcomes and Benefits to the Society
4.5 Conclusion
4.6 Limitations
4.7 Inference
4.8 Future Work
References
Chapter 5 The Implementation of the Concept of Lean Six Sigma Management
5.1 Introduction
5.2 Comparative Analysis of Choosing Enterprise Resource Planning Systems
5.3 Conclusions
References
Chapter 6 Design and Performance Analysis of Carrier Depletion PIN Phase Shifter for 50 Gbps Operation
6.1 Introduction
6.2 Design Structure
6.3 Results and Discussion
6.4 Conclusion
Acknowledgment
References
Chapter 7 Soft Computing Techniques for Blood Bank Inventory Model for Decaying Items with Storage Using Particle Swarm Optimization
7.1 Introduction
7.2 Literature Review
7.3 Assumptions and Notations
7.4 Formulation and Solution of the Model
7.5 Multiobjective Particle Swarm Optimization Algorithm
7.6 Numerical Illustration
7.7 Sensitivity Analysis
7.8 Conclusion
References
Chapter 8 Live Virtual Machine Migration Techniques in Cloud Computing
8.1 Introduction
8.1.1 Virtualization
8.2 Literature Work
8.3 Virtual Machine Migration
8.3.1 Virtual Machine Migration Mechanism
8.4 Migration Techniques
8.4.1 Pre-copy Virtual Machine Migration
8.4.2 Post-copy Virtual Machine Migration
8.4.3 Hybrid Live Virtual Machine Migration
8.5 Conclusion
Acknowledgments
References
Chapter 9 Dynamic Exchange Buffer Switching and Blocking Control in Wireless Sensor Networks
9.1 Introduction
9.2 Related Works
9.3 Performance Evaluation and the Methods
9.3.1 Trust-Based Blocking Control Protocol
9.3.2 Trust Evaluation
9.3.3 Securing the Data Packet Generation
9.4 Conclusion and Future Work
References
Index


πŸ“œ SIMILAR VOLUMES


Internet of Things Security and Data Pro
✍ Ziegler, SΓ©bastien πŸ“‚ Library πŸ“… 2019 πŸ› Springer Nature 🌐 English

<p><p>This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security thre

Trust-Based Communication Systems for In
✍ Prateek Agrawal, Vishu Madaan, Anand Sharma, Dilip Kumar Sharma, Akshat Agrawal, πŸ“‚ Library πŸ“… 2022 πŸ› Wiley-Scrivener 🌐 English

<p><span>TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS</span></p><p><span>Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference

Secure and Privacy-Preserving Data Commu
✍ Xu, Chang;Zhang, Zijian;Zhu, Liehuang πŸ“‚ Library πŸ“… 2017 πŸ› Springer Singapore;Springer Nature 🌐 English

Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: w

Secure and privacy-preserving data commu
✍ Xu, Chang;Zhang, Zijian;Zhu, Liehuang πŸ“‚ Library πŸ“… 2017 πŸ› Springer Nature 🌐 English

Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: w