توضیحاتی در مورد کتاب Cloud IoT: Concepts, Paradigms, and Applications
نام کتاب : Cloud IoT: Concepts, Paradigms, and Applications
عنوان ترجمه شده به فارسی : Cloud IoT: مفاهیم، پارادایم ها و کاربردها
سری :
نویسندگان : Jitendra Kumar Verma, Deepak Kumar Saxena, Vicente González-Prida Díaz, Vira Shendryk
ناشر : CRC Press/Chapman & Hall
سال نشر : 2022
تعداد صفحات : 286
ISBN (شابک) : 2022011771 , 9780367726188
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 35 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors’ Biographies
List of Contributors
Part I: Integrating IoT and Cloud
Chapter 1: Challenges Generated by the Integration of Cloud and IoT
1.1 Introduction
1.2 Background and Basic Concepts
1.2.1 Internet of Things
1.2.2 Cloud
1.2.2.1 Why Cloud Computing?
1.2.2.2 Classifications of Cloud Computing
1.2.2.3 Cloud Computing Services
1.2.2.4 Cloud Computing Architecture
1.2.2.5 Cloud Security Concerns
1.3 Need for and the Benefits of Cloud-IoT Integration
1.4 Cloud and IoT: Drivers for Integration
1.5 Integration Challenges
1.6 Healthcare Application through Cloud IoT
References
Chapter 2: Practical Implementation of an Asset Management System According to ISO 55001: A Future Direction in the Cloud and IoT Paradigm
2.1 Introduction
2.2 Preliminary Questions and Answers
2.2.1 How Is the Physical Asset Linked with the Accountability Concept?
2.2.2 Why Should a Company Invest in Implementing an AM System?
2.3 Practical Clarification on Asset Management Concept
2.4 Practical View on ISO 55000 Family of Standards
2.5 Review of Tools for the Asset Management System
2.5.1 Asset Inventory and Criticality Analysis
2.5.2 Process for Non-Critical Assets
2.5.3 Process for Critical Assets
2.6 Intelligent Asset Management Focused on CloudIoT
2.7 Conclusions and Future Research Lines
References
Chapter 3: ERP on the Cloud: Evolution, Benefits, and Critical Success Factors
3.1 Introduction
3.2 Evolution of ERP Systems
3.2.1 MRP: Predicting Material Requirement (1960–1970s)
3.2.2 MRP-II: Managing the Manufacturing Resources (the 1980s)
3.2.3 ERP: Integrating the Enterprise (the 1990s)
3.2.4 ERP-II: Going beyond the Enterprise (the 2000s)
3.2.5 ERP-III (2010 and Beyond)
3.3 Benefits of Cloud ERP
3.4 Critical Success Factors for Cloud ERP
3.4.1 CSFs Drawn from Earlier ERP Research
3.4.2 CSFs Specific to Cloud ERP
3.5 Towards the Enterprise of Things
References
Chapter 4: Case Study Based on Optimal Inspection Timing for a Motor-Fan Assembly: A View on Performance and Reliability in Cloud IoT
4.1 Introduction
4.2 Cost-Risk Analysis Model
4.3 Inspection Purpose and On-Condition Techniques
4.3.1 Condition Based Tasks
4.3.2 The Net P-F Interval
4.3.3 Categories of On-Condition Techniques
4.4 Optimal Inspection Timing Assessment Model
4.5 Case Study
4.6 Results and Conclusions
References
Part II: Addressing Climate Change
Chapter 5: Predictive Edge Computing of SST Time-Series-Based Marine Warning System using Cloud Computing Infrastructure
5.1 Introduction: Background and Driving Forces
5.2 Literature Review
5.3 Proposed Set up
5.4 NonLinear Auto Regression (NAR) using MATLAB Tool
5.5 Long Short-Term Memory (LSTM) using Python Programming
5.6 Error Parameters Used in the Proposed Optimized Algorithms and Time Series Plots
5.7 Outcome
References
Chapter 6: Solar PV and HTC-PFM Device: A Scheme for Smart Poultry Farm
6.1 Introduction
6.2 Literature Review
6.3 Proposed Design
6.4 Site Selection
6.5 Feasibility Analysis
6.6 ‘HTC-PFM’ Device Implementation
6.6.1 System Software Design
6.6.2 System Hardware Design
6.6.3 Design Prototype
6.6.4 Implemented ‘HTC-PFM’ Application
6.7 Required Electricity Demand Calculation
6.8 Specification of Solar PV Power Plant for Poultry Farm
6.8.1 Specification for the Panel
6.8.2 Required Solar Photovoltaic (PV) Panels
6.8.3 Sizing of Inverter
6.8.4 Sizing of Charge Controller
6.8.5 Specifications for the Charge Controller
6.8.6 Specifications for the Battery
6.8.7 Sizing of Battery
6.9 Results
6.10 Conclusion
References
Chapter 7: Cloud IoT for Pollution Monitoring: A Multivariate Weighted Ensemble Forecasting Approach for Prediction of Suspended Particulate Matter
7.1 Introduction
7.2 Literature Review
7.2.1 Role of IoT Technologies and Cloud for Air-Pollution Monitoring
7.2.2 Machine Learning Models for Air-Pollution Monitoring
7.3 Methodology
7.3.1 Data
7.3.2 Data Pre-Processing
7.3.3 Models
7.3.3.1 Multilayer Perceptron
7.3.3.2 Long-Short Term Memory
7.3.3.3 Convolution Neural Network
7.3.3.4 Seasonal Autoregressive Integrated Moving Average with Exogenous Variables
7.3.3.5 Ensemble Model
7.3.4 Optimization of Model Parameters
7.4 Results
7.5 Discussion and Conclusion
Acknowledgment
References
Chapter 8: Energy Balance Indicators Calculation Software Solution for Energy Management Systems
8.1 Introduction
8.2 Methods for Determining the Energy Efficiency of Buildings
8.3 Procedure for Energy Efficiency Certification
8.4 Structure of the Building Energy Certificate
8.5 Block Diagram of the Process of Calculating the Energy Certificate of the Building
8.6 Software Development
8.7 Conclusions
References
Part III: Smart Living
Chapter 9: A Comparison of Cloud-IoT-Based Frameworks of Identification and Monitoring of Covid-19 Cases
9.1 Introduction
9.2 System Architecture for Applications
9.2.1 Centralized Architecture
9.2.2 Decentralized Architecture
9.2.3 Hybrid Architecture
9.3 Overview of the Applications for Contact Tracing
9.3.1 Aarogya Setu
9.3.2 TraceTogether
9.3.3 CovidSafe
9.3.4 Apple/Google Exposure Notification
9.3.5 Corona-Warn-App
9.4 Privacy Concerns
9.4.1 Common Concerns
9.4.2 Concerns with Centralized Architecture
9.4.3 Concerns with Decentralized Architecture
9.4.4 TraceTogether
9.4.5 Aarogya Setu
9.5 Types of Attacks
9.5.1 Replay Attack
9.5.2 Denial of Service (DoS)
9.5.3 User Enumeration
9.5.4 Linkage Attacks
9.5.5 User Abuse
9.5.6 Carryover Attack
9.5.7 Trolling Attacks
9.5.8 Bluejacking
9.5.9 BlueSnarfing
9.5.10 Ransomware
9.5.11 Bluebugging
9.6 Approach for Prospective Solution
9.7 CloudIoT in Healthcare
9.7.1 Proposed Architecture
9.7.1.1 Hardware Layer
9.7.1.2 Communication Layer
9.7.1.3 Shared Blockchain Ledger
9.7.1.4 Application Layer
9.8 Conclusion and Future work
References
Chapter 10: Telemedicine, Telehealth, and E-health: A Digital Transfiguration of Standard Healthcare System
10.1 Introduction
10.1.1 Telemedicine Programs
10.1.2 Domains under Telemedicine Technology
10.1.3 Telemedicine Information Types
10.1.4 Telemedicine Service System
10.1.5 Telemedicine in India
10.1.6 Applications of Telemedicine
10.1.7 Telemedicine Challenges
10.1.8 Future of Telemedicine
10.2 Telehealth
10.2.1 Method and Processes
10.2.2 Telehealth Types
10.2.3 Majors Trends
10.2.4 Telehealth Advantages
10.2.5 Telehealth Disadvantages
10.2.6 Growth of Telehealth for the Past Nine Years
10.3 E-health
10.3.1 Areas of E-health
10.3.2 Challenges for E-Health
10.3.3 The Ten Most Common E\'s in “E-Health”
10.3.4 Pros and Cons of (E-Health)
10.4 Conclusion
References
Chapter 11: The Smart Accident Predictor System using Internet of Things
11.1 Introduction
11.2 Literature Review
11.2.1 Transportation in Smart City: Advantages and Real-Life Solutions
11.2.2 Components of Smart City Transportation
11.2.3 Interconnected Vehicles
11.2.4 Mobility as a Service (MaaS)
11.2.5 Advanced Traffic Management System (ATMS)
11.3 Methodology
11.3.1 Information Gathering and Data Processing
11.3.2 DBSCAN Data Clustering
11.3.3 Negative Sampling
11.4 Experimental Setup and Results
11.5 Conclusion
References
Chapter 12: An Efficient Lightweight Location Privacy Scheme for Internet of Vehicles (IOVs)
12.1 Introduction
12.1.1 Motivation
12.2 Related Work
12.3 Proposed Work
12.4 Conclusion and Future Work
References
Chapter 13: Energy-Efficient Privacy-Preserving Vehicle Registration (ENTRANCE) Protocol for V2X Communication in VANET
13.1 Introduction
13.2 Related Work
13.3 ENTRANCE System Model
13.3.1 Assumptions
13.4 Proposed ENTRANCE Scheme
13.4.1 Certificate Generation by Trusted Authority
13.4.2 Vehicle Registration Phase
13.4.3 RSU Registration Phase
13.5 Informal Analysis
13.5.1 Man-in-the-Middle Attack
13.5.2 Eavesdropping Attack (or) Network Sniffing
13.5.3 Masquerade Attack (or) Impersonation Attack (or) Spoofing Attack
13.5.4 Replay Attack (or) Playback Attack
13.5.5 Message Modification Attack
13.5.6 Brute Force Attack
13.5.7 Denial of Service Attack (DoS)
13.5.8 Flaw Attack
13.5.9 Key Replication Attack
13.6 Experimental Setup
13.6.1 Simulation Results
13.7 Conclusion
Acknowledgments
References
Part IV: Security
Chapter 14: Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices
14.1 Introduction: Background and Driving Forces
14.2 Emotion Detection
14.3 Genetic Approach
14.4 Training
14.5 Haar Highlight Selection
14.6 Creating Integral Images
14.7 Adaboost Training
14.8 Cascading Classifier
14.8.1 Model Testing for User
14.8.2 IoT Simulation
14.9 Outcome
References
Chapter 15: Blockchain-Based Web 4.0: Decentralized Web for Decentralized Cloud Computing
15.1 Introduction
15.2 History of Web
15.3 Blockchain
15.4 Working of Blockchain
15.4.1 Elliptic Curve Cryptography
15.5 Centralized to Decentralized Internetwork
15.6 Features of 4.0
15.7 Comparison of Different Web Generations
15.8 Benefits of Web 4.0
15.9 Example of Web 4.0
15.10 Decentralized Storage and Web 4.0: Future of Cloud Computing
15.10.1 Blockchain and Cloud
15.10.2 Decentralized Cloud Computing
15.11 Conclusion
References
Chapter 16: Significance of Elliptic Curve Cryptography in Blockchain IoT
16.1 Introduction
16.2 Literature Review
16.3 RSA
16.4 Steps for RSA Algo for Key Generation
16.5 Elliptic Curve Cryptography
16.6 Implementation of ECC Algorithm to Compute Encryption and Decryption Time
16.7 Security Analysis of ECC and RSA Algorithm
16.8 Conclusion
Reference
Chapter 17: Lightweight Trust Evaluation in IoT: Bio-Inspired Metaheuristic Approach
17.1 Introduction
17.1.1 Our Contribution
17.2 Related Work
17.3 System Model
17.3.1 Network Model and Energy Model
17.4 Proposed Model
17.4.1 Energy Metrics
17.4.2 Trust Metrics
17.4.3 Chaotic Salp Swarm Algorithm Procedure
17.5 Simulation Results
17.5.1 Simulation Matrices
17.5.2 Performance Analysis in Terms of Attacker Detection Per Round
17.5.3 Performance Analysis in Terms of Packet Loss Per Malicious Nodes
17.5.4 Performance Analysis in Terms of Residual Energy Per Number of Rounds
17.5.5 Performance Analysis in Terms of Number of Alive Nodes Per Number of Rounds
17.6 Conclusion and Future Perspective
Acknowledgment
References
Chapter 18: Smart Card Based Privacy-Preserving Lightweight Authentication Protocol: SIGNAL for E-Payment Systems
18.1 Introduction
18.2 Related Works
18.3 Proposed Scheme
18.3.1 User Registration Phase
18.3.2 Payment-Gateway Registration Phase
18.3.3 Mutual Authentication and Fresh Session Key Distribution Phase
18.4 Informal Security Analysis
18.4.1 Anonymity
18.4.2 Mutual Authentication
18.4.3 Full Forward Secrecy
18.4.4 Resistance to Privilege Escalation Attack
18.4.5 Resistance to Masquerade Attack
18.4.6 Resistance to Message Replay Attack
18.4.7 Resistance to Payment-Gateway Spoofing Attack
18.4.8 Resistance Against DOS Attack
18.4.9 Simulation Results using AVISPA
18.5 Conclusion
Acknowledgements
References
Index