This volume explores IoT architectures, their configuration, and operability in wireless sensor networks.
The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers.
The book is intended as a resource for graduate and postgraduate students for understanding network design for home and embedded applications, specifically using single board computing devices. It also serves as a guide for networking courses and assessments.
The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers.
The book is intended as a resource for graduate and postgraduate students for understanding network design for home and embedded applications, specifically using single board computing devices. It also serves as a guide for networking courses and assessments.
Readership
Graduate and post graduate students and faculty members in the field of networking and IoT.Table of Contents
CHAPTER 1 INTERNET-OF-THINGS-ENABLED SENSOR NETWORKS: VISION- CHALLENGES AND SMART APPLICATIONS
- Aatif Jamshed, Anshu Kumar Dwivedi, Pawan Singh Mehra and Arvind Dagur
1.1. Major Issues Resolved by Internet of Things
2. RELATED WORK
2.1. Smart City's Architecture
3. INTELLIGENT OR SMART CITY PLATFORM
3.1. Internet-of-Things Application Requirements
3.2. Internet-of-Things-Integrated Smart City WSN Applications and Roles
3.2.1. Internet-of-Things in Healthcare
3.2.2. Internet-of-Things in Industries
3.2.3. Internet of Things in Agriculture
3.2.4. Homes or Buildings Integrated with Internet-of-Things
3.2.5. Intelligent Transport System
3.2.6. Efficient Energy Management Using Internet-of-Things
3.2.7. Smart or Intelligent Water Management
3.2.8. Monitoring of the Environment with Internet-of-Things
- CONCLUSION
- REFERENCES
- WIRELESS SENSOR NETWORKS
- Ved Prakash, Suman Pandey and Deepti Singh
2. LITERATURE SURVEY
3. TAXONOMY OF SWARM INTELLIGENCE [14]
3.1. Ant Colony Optimization (ACO)
3.2. Fish Swarm Algorithm (FSA)
3.3. Particle Swarm Optimization (PSO)
3.4. Reactive Search Optimization (RSO)
3.5. Other Optimization Algorithms
- CONCLUSION
- REFERENCES
- IOT
- Aman Jatain, Sarika Chaudhary and Manju
2. RELATED WORK
3. RESEARCH METHODOLOGY
3.1. Process Flow of the System
4. RESULTS AND DISCUSSIONS
4.1. Demonstration of System
5. CONCLUSION AND FUTURE WORK
- REFERENCES
- WITH IMPROVED TRADEOFF FUNCTION FOR WIRELESS SENSOR NETWORKS
- Ankur and Ajay K. Sharma
2. RELATED WORKS
3. SYSTEM MODEL
4. OPTIMAL ELECTION CLUSTERING PROTOCOL
4.1. Setup Phase
4.2. CH Election Phase
4.3. Data Transmission Phase
5. HETEROGENEOUS OPTIMAL ELECTION UNEQUAL CLUSTERING ROUTING
- PROTOCOL
5.2.1. Neighbor Node Information Collection Phase
5.2.2. CH Competition Phase
5.2.3. Cluster Formation
5.3. Data Transmission Phase
6. SIMULATION RESULTS
- CONCLUSION
- REFERENCES
- PROTOCOLS USING SINK MOBILITY IN IOT-ENABLED WIRELESS SENSOR
- NETWORKS
- Samayveer Singh and Aruna Malik
2. RELATED WORK
3. SYSTEM MODEL
4. PROPOSED METHOD
5. EXPERIMENT SETUP AND RESULTS ANALYSIS
- CONCLUSION
- REFERENCES
- Manju and Priyanshi Pandey
2. RELATED WORK
3. PROPOSED SYSTEM ARCHITECTURE
4. SYSTEM COMPONENTS
5. SYSTEM WORKFLOW
6. FACE DETECTION
7. FACE RECOGNITION
8. RESULT AND DISCUSSION
- CONCLUSION AND FUTURE WORK
- REFERENCES
- Vikas Verma, Amit Garg and Saurabh Singhal
2. BEST PRACTICES FOR IMPLEMENTING BUSINESS RESILIENCE DURING A
- DATA BREACH
2.2. Checklist for Implementing Business Resilience during Data Breach
3. ROLE OF CYBER SECURITY IN BUSINESS RESILIENCE
3.1. Reducing Cyber Risk
- CONCLUSION AND FUTURE WORK
- REFERENCES
- Amit Garg, Ashish Kumar and Ankur Rastogi
2. SMART CITIES APPLICATIONS
2.1. Smart Government
2.2. Smart Transportation
2.3. Smart Environment
2.4. Smart Utilities
2.5. Smart Services
2.6. Smart Energy
2.7. Smart Building
2.8. Smart Mobility
2.9. Smart Education
2.10. Smart Health-Care
3. SECURITY AND PRIVACY ISSUES IN APPLICATIONS OF SMART CITIES
3.1. Botnet Activities in IoT-Based Applications
3.2. Threats of Driverless Cars in Smart Cities
3.3. Privacy Issues of Virtual Reality in Applications
3.4. Threats Posed by AI in Applications
4. SECURITY REQUIREMENTS OF APPLICATIONS
4.1. Secure Communication
4.2. Secure Booting
4.3. Security Monitoring, Analysis, and Response
4.4. System, Application, and Solution Lifecycle Management
4.5. Updating and Patching
4.6. Authentication, Identification, and Access Control
- CONCLUSION
- REFERENCES
- Saurabh Singhal and Manju
2. RELATED WORKS
2.1. Gray Area Network
3. SYSTEM MODEL
4. SIMULATION RESULTS
- CONCLUSION
- REFERENCES
- SUBJECT INDEX
Author
- Samayveer Singh
- Manju
- Aruna Malik
- Pradeep Kumar Singh