𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Secure and Smart Internet of Things (IoT) Using Blockchain and AI

✍ Scribed by Ahmed Banafa


Publisher
River Publishers
Year
2022
Tongue
English
Leaves
184
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other β€œdevices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other β€œthings”, which traditionally have not been Internet enabled.This β€œInternet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology.

✦ Table of Contents


Cover
Half Title
Series
Title
Copyright
Table of Contents
Foreword
Preface
List of Figures
List of Abbreviations
PART I: What Is IoT?
1 Internet of Things: The Third Wave?
1.1 Advantages and Disadvantages of IoT
2 The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits
2.1 IIoT, IoT and M2M
2.1.1 IIoT Challenges
2.1.2 IIoT Requirements
2.1.3 IIoT Benefits
2.2 The Future of the Industrial Internet of Things
3 Internet of Things: Security, Privacy and Safety
3.1 IoT's Threats
3.2 Threats Are Real
3.3 What Can We Do
4 Internet of Things: More than Smart β€œThings”
4.1 Industrial Internet
4.2 The IoT Value Chain
4.3 Internet of Things Predictions
4.4 Challenges Facing IoT
5 Internet of Things: Myths and Facts
5.1 IoT and Sensors
5.2 IoT and Mobile Data
5.3 IoT and the Volume of Data
5.4 IoT and Datacenters
5.5 IoT Is a Future Technology
5.6 IoT and Current Interoperability Standards
5.7 IoT and Privacy & Security
5.8 IoT and Limited Vendors
5.9 Conclusion
PART II: IoT Implementation & Standardization Challenges
6 Three Major Challenges Facing IoT
6.1 Technology
6.2 Technological Challenges
6.3 Business
6.4 Society
6.5 Privacy
6.6 Regulatory Standards
7 IoT Implementation and Challenges
7.1 Components of IoT Implementation
7.1.1 Sensors
7.1.2 Networks
7.1.3 Standards
7.1.4 Intelligent Analysis
7.1.5 Intelligent Actions
8 IoT Standardization and Implementation Challenges
8.1 IoT Standardization
8.2 IoT Implementation
8.2.1 Sensors
8.2.2 Networks
8.2.3 Standards
8.2.4 Intelligent Analysis
8.2.5 Intelligent Actions
8.3 The Road Ahead
9 Challenges Facing IoT Analytics Success
9.1 Data Structures
9.2 Combining Multiple Data Formats
9.3 The Need to Balance Scale and Speed
9.4 IoT Analytics at the Edge
9.5 IoT Analytics and AI
PART III: Securing IoT
10 How to Secure the Internet of Things
10.1 Challenges to Secure IoT Deployments
10.2 Dealing with the Challenges and Threats
10.3 The Optimum Platform
10.4 Last Word
11 Using Blockchain to Secure IoT
11.1 Challenges to Secure IoT Deployments
11.2 Dealing with the Challenges and Threats
11.3 The Optimum Platform
11.4 Decentralizing IoT Networks
11.5 The Blockchain Approach
11.5.1 What Is Blockchain?
11.5.2 What Are Some Advantages of Blockchain?
11.5.3 How Does It Work?
11.6 The Blockchain and IoT
12 IoT and Blockchain: Challenges and Risks
12.1 The Blockchain Model
12.2 Principles of Blockchain Technology
12.3 Public vs. Private Blockchain
12.4 Challenges of Blockchain in IoT
12.5 Risks of Using Blockchain in IoT
12.6 The Optimum Secure IoT Model
13 DDoS Attack: A Wake-Up Call for IoT
13.1 Security Is Not the Only Problem
13.1.1 Security Concerns
13.1.2 Privacy Issues
13.1.3 Inter-Operatability Standard Issues
13.1.4 Legal Regulatory and Rights Issues
13.1.5 Emerging Economy and Development Issues
13.2 How to Prevent Future Attacks?
PART IV: AI, Fog Computing and IoT
14 Why IoT Needs Fog Computing
14.1 The Challenge
14.2 The Solution
14.3 Benefits of Using Fog Computing
14.4 Real-Life Example
14.5 The Dynamics of Fog Computing
14.6 Fog Computing and Smart Gateways
14.7 Conclusion
15 AI Is the Catalyst of IoT
15.1 Examples of IoT Data
15.2 AI and IoT Data Analysis
15.3 AI in IoT Applications
15.4 Challenges Facing AI in IoT
15.5 Conclusion
PART V: The Future of IoT
16 IoT, AI and Blockchain: Catalysts for Digital Transformation
16.1 Digital Transformation
16.2 Internet of Things (IoT)
16.3 Digital Transformation, Blockchain and AI
16.4 Conclusion
17 Future Trends of IoT
17.1 Trend 1 - Lack of Standardization Will Continue
17.2 Trend 2 - More Connectivity and More Devices
17.3 Trend 3 - β€œNew Hope” for Security: IoT & Blockchain Convergence
17.4 Trend 4 - IoT Investments Will Continue
17.5 Trend 5 - Fog Computing Will Be More Visible
17.6 Trend 6 - AI & IoT Will Work Closely
17.7 Trend 7 - New IoT-as-a-Service (IoT-a-a-S) Business Models
17.8 Trend 8 - The Need for Skills in IoT's Big Data Analysis and AI Will Increase
PART VI: Inside Look at Blockchain
18 Myths about Blockchain Technology
18.1 Myth 1: The Blockchain Is a Magical Database in the Cloud
18.2 Myth 2: Blockchain Is Going to Change the World
18.3 Myth 3: Blockchain Is Free
18.4 Myth 4: There Is Only One Blockchain
18.5 Myth 5: The Blockchain Can be Used for Anything and Everything
18.6 Myth 6: The Blockchain Can be the Backbone of a Global Economy
18.7 Myth 7: The Blockchain Ledger Is Locked and Irrevocable
18.8 Myth 8: Blockchain Records Can Never be Hacked or Altered
18.9 Myth 9: Blockchain Can Only be Used in the Financial Sector
18.10 Myth 10: Blockchain Is Bitcoin
18.11 Myth 11: Blockchain Is Designed for Business Interactions Only
18.12 Myth 12: Smart Contracts Have the Same Legal Value as Regular Contracts
19 Cybersecurity & Blockchain
19.1 Implementing Blockchain in Cybersecurity
19.2 Advantages of Using Blockchain in Cybersecurity
19.2.1 Decentralization
19.2.2 Tracking and Tracing
19.2.3 Confidentiality
19.2.4 Fraud Security
19.2.5 Sustainability
19.2.6 Integrity
19.2.7 Resilience
19.2.8 Data Quality
19.2.9 Smart Contracts
19.2.10 Availability
19.2.11 Increase Customer Trust
19.3 Disadvantages of Using Blockchain in Cybersecurity
19.3.1 Irreversibility
19.3.2 Storage Limits
19.3.3 Risk of Cyberattacks
19.3.4 Adaptability Challenges
19.3.5 High Operation Costs
19.3.6 Blockchain Literacy
19.4 Conclusion
20 Future Trends of Blockchain
20.1 Blockchain Tracks
20.2 Blockchain Technology Future Trends
20.3 Blockchain Skills in Demand
20.4 Blockchain and Enterprise Applications
20.5 Blockchain and IoT Security
20.6 Blockchain and Zero-Trust Model
20.7 Final Words
References
Index
About the Author


πŸ“œ SIMILAR VOLUMES


Implementation of Smart Healthcare Syste
✍ Chinmay Chakraborty, Subhendukumar Pani, Mohd Abdul Ahad, Qin Xin πŸ“‚ Library πŸ“… 2022 πŸ› Academic Press 🌐 English

<p><span>Implementation of Smart Healthcare Systems using AI, IoT, and Blockchain</span><span> provides imperative research on the development of data fusion and analytics for healthcare and their implementation into current issues in a real-time environment. While highlighting IoT, bio-inspired com

Blockchain for Secure Healthcare Using I
✍ Sunil Gupta, Hitesh Kumar Sharma, Monit Kapoor πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>Healthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population. This has led to a renewed focus and attention that researchers from every discipline have put in to realize better strategie

Predictive Data Security using AI: Insig
✍ Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms

Smart and Secure Internet of Healthcare
✍ Nitin Gupta, Jagdeep Singh, Chinmay Chakraborty, Mamoun Alazab, Dinh-Thuan Do πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>Internet of Healthcare Things (IoHT) is an Internet of Things (IoT)-based solution that includes a network architecture which allows the connection between a patient and healthcare facilities. This book covers various research issues of smart and secure IoHT, aimed at providing solutions fo

TRIVERGENCE : Accelerating Innovation wi
✍ Bob Tapscott πŸ“‚ Library πŸ“… 2024 πŸ› Wiley 🌐 English

<p><b>A Breakthrough Introduction to The Next Phase of the Digital Age</b> <p>In <i>Trivergence,</i> <b>Bob Tapscott,</b> writer, speaker, complex system designer, and former CIO introduces an exciting new concept in explaining how the intersection of artificial intelligence (AI), blockchain, and th

Internet of Things and Secure Smart Envi
✍ Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<p>The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy