E-Book, Englisch, Band 25, 319 Seiten
Reihe: Studies in Big Data
Acharjya / Geetha Internet of Things: Novel Advances and Envisioned Applications
1. Auflage 2017
ISBN: 978-3-319-53472-5
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 25, 319 Seiten
Reihe: Studies in Big Data
ISBN: 978-3-319-53472-5
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications.
The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;7
2;Acknowledgements;12
3;Contents;13
4;Contributors;15
5;Acronyms;17
6;Part I Fundamentals and Architecture of Internet of Things;21
7;Relay Technology for 5G Networks and IoT Applications;22
7.1;1 Introduction;22
7.2;2 Relay Classification;23
7.2.1;2.1 Classification Based on Layers;23
7.2.2;2.2 Classification Based on Duplexing Schemes;24
7.2.3;2.3 Classification Based on Resources Assignment;26
7.2.4;2.4 3GPP Classification;26
7.3;3 Potential Benefits of Relaying;27
7.3.1;3.1 Relay to Improve Channel Reliability;27
7.3.2;3.2 Relay to Improve System Throughput;28
7.3.3;3.3 Relay to Improve Service Continuity;28
7.3.4;3.4 Relay for Offloading and Load Sharing;29
7.3.5;3.5 Relay to Reduce Operational Costs;29
7.4;4 Relay Deployment Strategies in 5G Networks;30
7.4.1;4.1 Multi-hop Relay;30
7.4.2;4.2 Mobile Relay;31
7.4.3;4.3 Heterogeneous Relay;32
7.4.4;4.4 Relay Aassisted D2D Communication;33
7.4.5;4.5 Multiple Backhaul Relay;33
7.5;5 Future Challenges and Research Directions;34
7.5.1;5.1 Radio Resource Allocation;34
7.5.2;5.2 Power Control;36
7.5.3;5.3 Admission Control;36
7.5.4;5.4 Relay Selection;37
7.5.5;5.5 Handoff;37
7.5.6;5.6 Routing;38
7.6;6 Fog Computing and Video Streaming Applications;39
7.6.1;6.1 Fog Computing Paradigm;39
7.6.2;6.2 Video Streaming Application;40
7.6.3;6.3 Simulation and Results;41
7.7;7 Conclusion;44
7.8;References;44
8;Two-Way Authentication for the Internet-of-Things;46
8.1;1 Introduction;47
8.2;2 Background Information;49
8.2.1;2.1 Wireless Sensor Networks and the Internet-of-Thing;50
8.2.2;2.2 Security Solutions for Wireless Sensor Networks;52
8.3;3 A Standard-Based End-to-End Security Architecture;53
8.4;4 DTLS Solution for Resource-Full Devices;55
8.4.1;4.1 DTLS Protected Message Structure;55
8.4.2;4.2 Certificate Structure;56
8.4.3;4.3 DTLS Handshake Assumption;57
8.4.4;4.4 Security Considerations for DTLS Handshake;58
8.5;5 Evaluation;60
8.5.1;5.1 Data Transfer Latency;61
8.5.2;5.2 Handshake Latency;62
8.5.3;5.3 Memory Consumption;65
8.5.4;5.4 Energy Consumption;66
8.5.5;5.5 Comparison to Related Work;70
8.6;6 Conclusion;72
8.7;References;73
9;Mobility Support and Service Discovery for Industrial Process Monitoring;76
9.1;1 Introduction;77
9.2;2 State of the Art;78
9.2.1;2.1 Wireless Sensor Networks;78
9.2.2;2.2 Industrial Middleware;81
9.3;3 The OCARI Wireless Sensor Network;82
9.3.1;3.1 Mobility Support;84
9.4;4 The OPC-UA/ROSA Middleware;90
9.4.1;4.1 The ROSA Overlay Network;91
9.4.2;4.2 The Link Between OPC-UA and ROSA;92
9.4.3;4.3 The Link Between OCARI and OPC-UA;93
9.5;5 The KASEM Predictive Maintenance System;94
9.6;6 Implementation and Use Cases;98
9.6.1;6.1 The OCARI Development Platform;99
9.6.2;6.2 Sensor Nodes Supported;99
9.6.3;6.3 OCARI Tuning;100
9.7;7 Conclusion;102
9.8;References;103
10;MAC Protocols in Body Area Network-A Survey;105
10.1;1 Introduction;105
10.2;2 Communications in Body Area Network;108
10.3;3 Challenges and Research Issues in Body Area Network;109
10.4;4 IEEE Sandard for Body Area Network;112
10.5;5 MAC Techniques for Reliable and Efficient Body Area Network;113
10.5.1;5.1 Scheduled Time Division Multiple Access MAC Protocol;114
10.5.2;5.2 Polling Based MAC Protocol;115
10.5.3;5.3 Random Access MAC Protocol;116
10.5.4;5.4 Preemption Enhanced Distributed Channel Access Priority MAC Protocol;117
10.5.5;5.5 Sensor MAC;118
10.5.6;5.6 Traffic Adaptive MAC;119
10.5.7;5.7 X-MAC;120
10.5.8;5.8 Medical MAC (M-MAC);121
10.6;6 Implications for Researchers and Practitioners;122
10.7;7 Conclusion;123
10.8;References;124
11;Internet of Nano Things and Industrial Internet of Things;126
11.1;1 Introduction;126
11.2;2 Internet of Nano Things;127
11.2.1;2.1 Architecture of Internet of Nano Things;128
11.2.2;2.2 Communication Classifications;128
11.2.3;2.3 Communication Issues;129
11.2.4;2.4 Applications;130
11.2.5;2.5 Security Issues in IoNT;132
11.2.6;2.6 Future Research Directions in IoNT;132
11.3;3 Industrial Internet of Things;133
11.3.1;3.1 Functional Model of Industrial Internet of Things;134
11.3.2;3.2 Requirements for Industrial Internet of Things;136
11.3.3;3.3 Benefits of Industrial Internet of Things;137
11.3.4;3.4 Security Issues in IIoT;138
11.3.5;3.5 Future Research Directions in IIoT;139
11.4;4 Conclusion;139
11.5;References;140
12;Part II Distributed Systems and Security in Internet of Things;141
13;Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption;142
13.1;1 Introduction;143
13.2;2 Literature Review and Objectives;145
13.3;3 Proposed Model;149
13.3.1;3.1 Affine Cryptography;150
13.3.2;3.2 Mechanism of Selection of Keys from an Array;151
13.4;4 Experimental Work;154
13.4.1;4.1 Analysis;154
13.4.2;4.2 Memory Consumption;155
13.4.3;4.3 Time Consumption;156
13.5;5 Conclusion and Future Work;160
13.6;References;161
14;Recognizing Attacks in Wireless Sensor Network in View of Internet of Things;163
14.1;1 Introduction;163
14.2;2 Symptoms of Various Attacks in Wireless Sensor Network;165
14.2.1;2.1 Jamming;165
14.2.2;2.2 Hello Flood Attack;166
14.2.3;2.3 Selective Forwarding;167
14.2.4;2.4 Routing Anomalies;167
14.3;3 Protection Requirements in Wireless Sensor Networks;171
14.3.1;3.1 Protection Characteristics;171
14.3.2;3.2 Protection Systems;172
14.4;4 Analysis of Trust in Wireless Sensor Networks;173
14.4.1;4.1 Characteristics of Trust;174
14.4.2;4.2 Trust Computations;175
14.4.3;4.3 Trust Values;175
14.4.4;4.4 Classical Trusting Techniques in Wireless Sensor Networks;176
14.5;5 Trusting Technique Challenges in Wireless Sensor Networks;179
14.6;6 Modern Trusting Techniques for Wireless Sensor Network;180
14.6.1;6.1 Ant Colony Trusting Influence Technique;180
14.6.2;6.2 Clustering Based Trusting Technique;181
14.6.3;6.3 Key Formation Based Trusting Technique;183
14.7;7 Conclusion;184
14.8;References;185
15;Wireless Sensor Network in Automation and Internet of Things;187
15.1;1 Introduction;187
15.2;2 Wireless Sensor Network;188
15.2.1;2.1 Components of WSN Node;188
15.2.2;2.2 Creating Wireless Sensor Network;189
15.2.3;2.3 Classification of WSN;190
15.2.4;2.4 Sensors for Real Time Processing;192
15.2.5;2.5 Operating System;195
15.3;3 Wireless Sensor Network and IOT;197
15.3.1;3.1 Integration of WSN with IOT;199
15.3.2;3.2 Automation of WSN in IOT;200
15.3.3;3.3 Verdict of Automation;202
15.4;4 Green Computing and IoT;203
15.5;5 Conclusion and Future Challenges;204
15.6;References;204
16;Challenges of Distributed Storage Systems in Internet of Things;206
16.1;1 Introduction;206
16.2;2 Distributed Storage Systems;207
16.2.1;2.1 Types of Distributed Storage Systems;208
16.2.2;2.2 Distributed Storage Architectures;209
16.3;3 Data Fusion in Distributed Storage Systems;211
16.4;4 Privacy and Security;212
16.5;5 Trust in Distributed Storage Systems;215
16.6;6 Conclusion;216
16.7;References;216
17;Part III Challenges, Issues and Healthtcare Applications of Internet of Things;218
18;Internet of Things Based Intelligent Elderly Care System;219
18.1;1 Introduction;219
18.2;2 Visual Information Representation and Fall Detection Approaches;222
18.3;3 Fall Detection Framework - Overview;223
18.3.1;3.1 Feature Description;224
18.3.2;3.2 Support Vector Machines;228
18.3.3;3.3 K-Nearest Neighbor;230
18.3.4;3.4 Decision Tree;231
18.3.5;3.5 Fall Detection Dataset;231
18.3.6;3.6 Motion Projection Profile with SVM;234
18.3.7;3.7 Motion Projection Profile with K-NN;235
18.3.8;3.8 Motion Projection Profile with Decision Tree (J48);237
18.4;4 Future Research Directions;238
18.5;5 Conclusion;239
18.6;References;240
19;Challenges, Issues and Applications of Internet of Things;242
19.1;1 Introduction;242
19.2;2 General Architecture of IoT;244
19.2.1;2.1 Applications;244
19.3;3 Advantages and Limitations;250
19.4;4 Implementation Challenges and Issues;252
19.5;5 Future Research Directions;252
19.6;6 Conclusion;253
19.7;References;253
20;Application of Technologies in Internet of Things;255
20.1;1 Introduction;255
20.2;2 Basic Working Principle of IoT;256
20.3;3 Technologies in IoT;259
20.3.1;3.1 Sensor Technology;259
20.3.2;3.2 Communication Technology;260
20.3.3;3.3 Middleware Technology;264
20.3.4;3.4 Cloud Computing Technology;265
20.4;4 Technologies of IoT in Medical;266
20.4.1;4.1 Research Projects;268
20.5;5 Conclusion and Future Challenges;268
20.6;References;269
21;Part IV Industry and Societal Applications of Internet of Things;271
22;An Appraisal on Human-Centered Internet of Things;272
22.1;1 Introduction;272
22.2;2 Case Studies of Human Centered IoT;274
22.2.1;2.1 Drug Tracker for Patient Safety;274
22.2.2;2.2 IoT Embedded Systems for Disabled Persons;277
22.2.3;2.3 Elderly People Care Using IoT;280
22.2.4;2.4 IoT Support for Children Affected by ASD;281
22.2.5;2.5 Tracking of Night Drivers for Accident Prevention;283
22.2.6;2.6 IoT Based Healthcare System for Wheelchair Users;286
22.2.7;2.7 Smart Home for Elderly and Disabled Persons;287
22.3;3 Conclusion and Future Research;288
22.4;References;289
23;A Survey on Internet of Things: Case Studies, Applications, and Future Directions;290
23.1;1 Introduction;291
23.2;2 Architecture of IoT;292
23.2.1;2.1 Findings of IoT;293
23.2.2;2.2 Challenges;294
23.3;3 Applications of Internet of Things;295
23.3.1;3.1 Smart Traffic System;296
23.3.2;3.2 Smart Environment;296
23.3.3;3.3 Smart Home;297
23.3.4;3.4 Healthcare Monitoring Applications;297
23.3.5;3.5 Logistics and Supply Chain Management;298
23.4;4 Case Study on Multi Robot System;298
23.5;5 Case Study on Emergency Department in Hospitals;301
23.6;6 Internet of Things Future Vision;303
23.7;7 Conclusion;304
23.8;References;305
24;Internet of Things in Cloud Computing;307
24.1;1 Introduction;307
24.2;2 Cloud Computing;308
24.2.1;2.1 Cloud Computing Models;309
24.3;3 Internet of Things;310
24.3.1;3.1 Classifications of Internet of Things;311
24.3.2;3.2 Applications of Internet of Things;312
24.3.3;3.3 Security and Challenges in Internet of Things;314
24.3.4;3.4 Future Research Directions in Internet of Things;314
24.3.5;3.5 Practical System in Internet of Things;315
24.4;4 Internet of Things in the Cloud;316
24.4.1;4.1 Challenges to Enable Internet of Things in Cloud Computing;317
24.4.2;4.2 Future Research Directions;318
24.5;5 Conclusion;318
24.6;References;319




