+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

  • Book

  • March 2024
  • Bentham Science Publishers Ltd
  • ID: 5960298
This volume explores IoT architectures, their configuration, and operability in wireless sensor networks.

The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers.

The book is intended as a resource for graduate and postgraduate students for understanding network design for home and embedded applications, specifically using single board computing devices. It also serves as a guide for networking courses and assessments.

Readership

Graduate and post graduate students and faculty members in the field of networking and IoT.

Table of Contents

CHAPTER 1 INTERNET-OF-THINGS-ENABLED SENSOR NETWORKS: VISION
  • CHALLENGES AND SMART APPLICATIONS
  • Aatif Jamshed, Anshu Kumar Dwivedi, Pawan Singh Mehra and Arvind Dagur
1. INTRODUCTION
1.1. Major Issues Resolved by Internet of Things

2. RELATED WORK
2.1. Smart City's Architecture

3. INTELLIGENT OR SMART CITY PLATFORM
3.1. Internet-of-Things Application Requirements
3.2. Internet-of-Things-Integrated Smart City WSN Applications and Roles
3.2.1. Internet-of-Things in Healthcare
3.2.2. Internet-of-Things in Industries
3.2.3. Internet of Things in Agriculture
3.2.4. Homes or Buildings Integrated with Internet-of-Things
3.2.5. Intelligent Transport System
3.2.6. Efficient Energy Management Using Internet-of-Things
3.2.7. Smart or Intelligent Water Management
3.2.8. Monitoring of the Environment with Internet-of-Things
  • CONCLUSION
  • REFERENCES
CHAPTER 2 A PERSPECTIVE VIEW OF BIO-INSPIRE APPROACHES EMPLOYING IN
  • WIRELESS SENSOR NETWORKS
  • Ved Prakash, Suman Pandey and Deepti Singh
1. INTRODUCTION

2. LITERATURE SURVEY

3. TAXONOMY OF SWARM INTELLIGENCE [14]
3.1. Ant Colony Optimization (ACO)
3.2. Fish Swarm Algorithm (FSA)
3.3. Particle Swarm Optimization (PSO)
3.4. Reactive Search Optimization (RSO)
3.5. Other Optimization Algorithms
  • CONCLUSION
  • REFERENCES
CHAPTER 3 AUTOMATIC ACCIDENT DETECTION AND ALERTING SYSTEM USING
  • IOT
  • Aman Jatain, Sarika Chaudhary and Manju
1. INTRODUCTION

2. RELATED WORK

3. RESEARCH METHODOLOGY
3.1. Process Flow of the System

4. RESULTS AND DISCUSSIONS
4.1. Demonstration of System

5. CONCLUSION AND FUTURE WORK
  • REFERENCES
CHAPTER 4 OPTIMAL ELECTION UNEQUAL CLUSTERING ROUTING PROTOCOL
  • WITH IMPROVED TRADEOFF FUNCTION FOR WIRELESS SENSOR NETWORKS
  • Ankur and Ajay K. Sharma
1. INTRODUCTION

2. RELATED WORKS

3. SYSTEM MODEL

4. OPTIMAL ELECTION CLUSTERING PROTOCOL
4.1. Setup Phase
4.2. CH Election Phase
4.3. Data Transmission Phase

5. HETEROGENEOUS OPTIMAL ELECTION UNEQUAL CLUSTERING ROUTING
  • PROTOCOL
5.2. Cluster Setup Phase
5.2.1. Neighbor Node Information Collection Phase
5.2.2. CH Competition Phase
5.2.3. Cluster Formation
5.3. Data Transmission Phase

6. SIMULATION RESULTS
  • CONCLUSION
  • REFERENCES
CHAPTER 5 ANALYSIS AND PERFORMANCE EVALUATION OF ROUTING
  • PROTOCOLS USING SINK MOBILITY IN IOT-ENABLED WIRELESS SENSOR
  • NETWORKS
  • Samayveer Singh and Aruna Malik
1. INTRODUCTION

2. RELATED WORK

3. SYSTEM MODEL

4. PROPOSED METHOD

5. EXPERIMENT SETUP AND RESULTS ANALYSIS
  • CONCLUSION
  • REFERENCES
CHAPTER 6 IOT BASED HOME SECURITY SYSTEM
  • Manju and Priyanshi Pandey
1. INTRODUCTION

2. RELATED WORK

3. PROPOSED SYSTEM ARCHITECTURE

4. SYSTEM COMPONENTS

5. SYSTEM WORKFLOW

6. FACE DETECTION

7. FACE RECOGNITION

8. RESULT AND DISCUSSION
  • CONCLUSION AND FUTURE WORK
  • REFERENCES
CHAPTER 7 CYBER SECURITY FROM A BUSINESS PERSPECTIVE
  • Vikas Verma, Amit Garg and Saurabh Singhal
1. INTRODUCTION

2. BEST PRACTICES FOR IMPLEMENTING BUSINESS RESILIENCE DURING A
  • DATA BREACH
2.1. Practices for Implementing Business Resilience
2.2. Checklist for Implementing Business Resilience during Data Breach

3. ROLE OF CYBER SECURITY IN BUSINESS RESILIENCE
3.1. Reducing Cyber Risk
  • CONCLUSION AND FUTURE WORK
  • REFERENCES
CHAPTER 8 SECURITY AND PRIVACY OF APPLICATION OF SMART CITIES
  • Amit Garg, Ashish Kumar and Ankur Rastogi
1. INTRODUCTION

2. SMART CITIES APPLICATIONS
2.1. Smart Government
2.2. Smart Transportation
2.3. Smart Environment
2.4. Smart Utilities
2.5. Smart Services
2.6. Smart Energy
2.7. Smart Building
2.8. Smart Mobility
2.9. Smart Education
2.10. Smart Health-Care

3. SECURITY AND PRIVACY ISSUES IN APPLICATIONS OF SMART CITIES
3.1. Botnet Activities in IoT-Based Applications
3.2. Threats of Driverless Cars in Smart Cities
3.3. Privacy Issues of Virtual Reality in Applications
3.4. Threats Posed by AI in Applications

4. SECURITY REQUIREMENTS OF APPLICATIONS
4.1. Secure Communication
4.2. Secure Booting
4.3. Security Monitoring, Analysis, and Response
4.4. System, Application, and Solution Lifecycle Management
4.5. Updating and Patching
4.6. Authentication, Identification, and Access Control
  • CONCLUSION
  • REFERENCES
CHAPTER 9 SECURITY METRIC FOR INFORMATION NETWORK
  • Saurabh Singhal and Manju
1. INTRODUCTION

2. RELATED WORKS
2.1. Gray Area Network

3. SYSTEM MODEL

4. SIMULATION RESULTS
  • CONCLUSION
  • REFERENCES
  • SUBJECT INDEX

Author

  • Samayveer Singh
  • Manju
  • Aruna Malik
  • Pradeep Kumar Singh