+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Trust-Based Communication Systems for Internet of Things Applications. Edition No. 1

  • Book

  • 336 Pages
  • September 2022
  • John Wiley and Sons Ltd
  • ID: 5838335

TRUST-BASED COMMUNICATION SYSTEMS FOR INTERNET OF THINGS APPLICATIONS

Highlighting the challenges and difficulties in implementing trust-based communication systems for Internet of Things (IoT) services and applications, this innovative new volume is a critical reference source for academics, professionals, engineers, technology designers, analysts, and students.

The primary objective of this edited book is to deliver technologies to improve trust and eliminate malicious actors in participatory exchanges throughout communication using Internet of Things (IOT) devices such that these methods should not only be able to identify bad actors but also to improve communication and trust in the environment without violating object privacy. Whether as a reference for the engineer or scientist or a textbook for the student, this is a must-have for any library.

Table of Contents

Preface xiii

Book Description xv

1 An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation 1
Deepika Gupta, Asmita Singh, Anand Sharma and Gurpreet Singh

1.1 Introduction 1

1.2 Growth of IoT 2

1.3 IoT Technologies 3

1.4 Application Areas of Internet of Things 4

1.5 IoT Security and Protection Concerns 11

1.6 IoT Security 12

1.7 Conclusion 12

2 Blockchain in IoT and Limitations 17
Vishal Walia, Vishu Madaan, Prateek Agrawal, Anand Mohan, Charu Gupta, Anand Sharma and Akshat Agrawal

2.1 Introduction 18

2.2 Literature Review 22

2.3 Limitations of Blockchain 23

2.4 Conclusion 24

3 IoT Protocol Security Mechanisms 29
D. Karthika and Dr. K. Kalaiselvi

3.1 Introduction 30

3.2 Comparing to IoT Security and Cyber-Physical Structures 31

3.3 Potential IoT and the Need for Safety 32

3.4 Future-Cognitive Structures and IoT 32

3.5 Security Engineering for IoT Development 33

3.6 Building Security into Design and Development 34

3.7 Security in Agile Developments 35

3.8 Focusing on the IoT Device in Operation 36

3.9 IoT Security Innovation Cryptographic Basics 37

3.10 Cryptographic Primitive Forms and Implementations in the IoT 37

3.11 Encryption and Decryption 38

3.12 Hashes 41

3.13 Digital Signatures 42

3.14 Generation of Random Numbers 43

3.15 Cloud Security for IoT 44

3.16 Control of Assets/Inventories 45

4 IoT Security, Privacy, Challenges, and Solutions 53
Ankit Garg, Ashima Gambhir and Prachi Goel

4.1 Introduction 54

4.1.1 Elements of Internet of Things (IoT) 55

4.2 IoT Landscape: Current and Potential Applications 56

4.3 Advantages of Internet of Things (IoT) 59

4.4 Architecture of IoT Systems 60

4.5 IoT Security 63

4.6 Security Challenges in IoT Architecture 66

4.7 Security by Design in IoT 71

4.8 Best Practices to Secure IoT Devices 71

4.9 Security Attacks in IoT System 73

4.10 Various IoT Security Challenges 78

4.11 Limitations of Available Resources 79

4.12 Solutions to Preserve Privacy in IoT Systems 83

5 CIA-CPS: Concept, Issues, and Application of IoT in Cyber Physical System 93
Gaurav Jolly and Rahul Johari

5.1 Introduction 93

5.2 Cyber Physical System: Definition 95

5.3 System Interfaces 96

5.4 Communication Channel 98

5.5 Physical Interaction 100

5.6 CPS vs IoT 102

5.7 Cyber Physical System Issues 104

5.8 Literature Survey 106

5.9 Applications of Cyber Physical System 108

5.10 Future of Cyber Physical Systems 115

5.11 Conclusion 116

6 Trust Calculation in IoT Nodes Without Trusted Third Party Using PUF Methodology 119
Sivasankari Narasimhan

6.1 Introduction 119

6.2 Related Works 121

6.3 Trust Calculation Basics 123

6.4 Deriving Trust Relationships 127

6.5 Trust Derivation Examples 128

6.6 Combination of Trust Relationship 130

6.7 Analysis of Attacks 131

6.8 Conclusions 132

7 Comparative Analysis of Indexing Schemes Used in Cloud Computing Data Management 135
Prachi Goyal, Ankit Garg and Prakhar Jindal

7.1 Introduction 136

7.2 Literature Review 138

7.3 Overview of System Architecture 140

7.4 Experiments and Comparison 142

7.5 Database for Experiment 143

7.6 Assessment of the Index Structure 144

7.7 Performance Evaluation of Exact Search 147

7.8 Evaluation of Indexing Schemes Based on k-Nearest Neighbor Search 148

7.9 Evaluation of Data Distribution 152

7.10 Conclusion 153

8 Evolution and Insight in Industrial Internet of Things (IIoT): Importance and Impact 159
Nabeela Hasan and Mansaf Alam

8.1 Introduction 160

8.2 An Efficient Approach Towards IIoT Technology 161

8.3 Evolution of IIoT 163

8.4 IIoT Architecture 165

8.5 Industrial Applications of IoT 172

8.6 Smart Manufacturing 172

8.7 Smart Healthcare 173

8.8 Smart Transportation 174

8.9 Smart Cities 174

8.10 Oil and Gas Industry 175

8.11 Logistics and Supply Chain 176

8.12 Basic Technologies of IIoT 177

8.13 Things Over Internet 178

8.14 Technology on Blockchain 178

8.15 Computing of Data Over Cloud Technology 178

8.16 Artificial Intelligence and Cyber Physical Systems 179

8.17 Analytics on Management of Big Data 179

8.18 Future Technologies: Augmented and Virtual Reality 180

8.19 Industry 4.0 180

8.20 Research Challenges 187

8.20.1 Energy Efficiency 187

8.20.2 Coexistence and Interoperability 187

8.20.3 Real-Time Performance 188

8.20.4 Security and Privacy 189

8.20.5 Fault Detection and Reconfiguration 189

8.20.6 User-Friendliness in Product Deployment and Usage 190

8.21 Conclusions 190

9 Evolving Trends of Artificial Intelligence and Robotics in Smart City Applications: Crafting Humane Built Environment 195
Niva Rana Mahanta and Suvarna Lele

9.1 Fundamentals of Smart Cities 196

9.2 Case Study Analysis 209

9.3 Smart Buildings in Smart Cities: Humane Approach 225

9.4 Future Scope and Impact on Society 232

9.5 Conclusion 235

10 T-Secure IoT in Smart Home System 243
Esra SIPAHI, Md Harun Rashid and Erkin ARTANTAS

10.1 Introduction 244

10.2 Literature 245

10.3 Method 254

10.4 Chematic Implementation 260

10.5 Simulation and Result 260

10.6 Conclusion 260

11 Intelligent Micro-Mobility E-Scooter: Revolutionizing Urban Transport 267
Leena Wanganoo, VinodKumar Shukla and Vaishnavi Mohan

11.1 Introduction 268

11.2 Intelligent Transport System 269

11.3 Technologies Used in Intelligent Transport Systems 270

11.4 Micro Mobility 272

11.5 Case Study 276

11.6 Methodology: Value -- Steam Mapping the Existing Operations 276

11.7 Operational Challenges Faced by Arnab Micro Mobility 281

11.8 Conclusion 287

12 Automatic Booking of LPG and Leakage Detection System Using IoT 291
Aishwarya Jain, Meghana H M and Annaiah H

12.1 "What is IoT?" 292

12.2 Why IoT Matters 292

12.2.1 Collecting and Sending Information 293

12.2.2 Receiving and Acting on Information 293

12.2.3 Doing Both: The Goal of an IoT System 294

12.3 The oneM2M IoT Standardized Architecture 294

12.4 The IoT World Forum (IoTWF) Standardized Architecture 296

12.5 A Simplified IoT Architecture 299

12.6 Case Study: Automatic LPG Booking and Leakage Detection System using IoT 302

12.6.1 Problem Statement 302

12.6.2 Proposed Solution 303

12.6.3 Architecture of the System 304

12.6.4 System Setup 308

12.6.5 Working of System 308

12.7 Conclusion 310

References 310

Index 313

Authors

Prateek Agrawal University of Klagenfurt, Austria; Lovely Professional University, India. Vishu Madaan Lovely Professional University, India; IKG-Punjab Technical University, Punjab. Anand Sharma MUST, Lakshmangarh. Dilip Kumar Sharma GLA University, Mathura, U.P., India. Akshat Agrawal Amity University Haryana. Sandeep Kautish LBEF Campus, Kathmandu Nepal.