Trust-Based Communication Systems for Internet of Things Applications. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов страница 8

Trust-Based Communication Systems for Internet of Things Applications - Группа авторов

Скачать книгу

services, and more information about Wiley products visit us at www.wiley.com.

       Limit of Liability/Disclaimer of Warranty

      While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

       Library of Congress Cataloging-in-Publication Data

      ISBN 9781119896333

      Cover image: IoT industry 4.0 concept, Ekkasit919 | Dreamstime.com

      Cover design by Kris Hackerott

      Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

      Printed in the USA

      10 9 8 7 6 5 4 3 2 1

      Preface

      With an enormous range of applications, Internet of Things (IoT) has magnetized industries and

      academics from everywhere. IoT facilitates communication and operations through Internet access to all the devices with computing capabilities. Many applications can be applied in IoT, such as intelligent transportation systems, real-time medical monitoring, intelligent appliances and intelligent agriculture, and the smart grid. Internet of Things (IoT) makes a smart communication process between objects and their environment over the internet. Security and privacy are two important aspects of IoT applications. Smart objects and machine-to-machine communications with complete data security are now a demand. Similarly, privacy is another major challenge of IoT applications where an object is free from interference from other objects. Trust based communication is one way to deal with these primary IoT based aspects. Internet of Things (IoT) creates a world where smart objects and services interact autonomously. Therefore, a central issue is whether the service provided by a selected IoT device is trustworthy. Further, most IoT devices are mobile and will connect to the Internet on and off, depending on the location they roam into as well as the energy status of individual IoT devices. Considering the dynamic-heterogeneous characteristic of interconnected devices in IoT, it demands an effective and efficient trust-based IoT communication system that can scale to many heterogeneous devices in IoT systems. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviours randomly to avoid being rated as a menace.

      This book encompasses all aspects of research and development of secure IoT applications. It delivers technologies to improve trust and eliminate malicious actors in participatory exchanges throughout the communication using IoT devices ss that these methods are not only be able to identify bad actors, but also to improve communication and trust in the environment without violating object privacy. This book also covers a broad spectrum of applications in the community from industry, government, and academia. This book brings together thought leaders, researchers, industry practitioners, potential users of communication technology, and IoT device manufacturers to develop the field, discuss new trends and opportunities, exchange ideas and practices, and promote interdisciplinary and cross-domain collaborations.

       Dr. Prateek Agrawal Dr. Vishu MadaanDr. Anand Sharma Dr. Dilip SharmaMr. Akshat AgarwalDr. Sandeep Kautish

      Book Description

      This book “Trust-Based Communication Systems for Internet of Things Applications” provides the conceptual and fundamental research related to secure and trust-based communication in IoT devices and applications. It also includes demonstrations on a wide range of interdisciplinary applications and innovative developments in the field of IoT such as IIoT, block-chain technology, etc. that address the latest findings and results regarding a wide variety of technological issues and developments to reform the scientific society.

      The book contains 12 chapters. Chapter 1 titled “An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation” highlights the fundamental concepts of various IoT applications such as interoperability, smart cities, smart pharmacy, workplaces, home, transport, and vegetable traceability framework.

      Chapter 2 titled “Blockchain in IoT and Limitations” presents the decentralized approach using blockchain technology to secure the IoT applications and highlight its limitations.

      Chapter 3 titled “IoT Protocol Security Mechanisms” discusses several security aspects in IoT applications and discusses various cryptographic protocols which can be used in different IoT enabled applications to secure inter-communication.

      Chapter 4 titled “IoT Security, Privacy, Challenges, and Solutions” presents a few highlights on IoT security, privacy, challenges, and solutions. The chapter begins with an introduction to IoT. and its architecture and later addresses various Internet of Things security challenges and best practices to safeguard.

      Chapter 5 titled “CIA-CPS:

Скачать книгу