E-Book, Englisch, 182 Seiten
Reihe: Internet of Things
Matin Towards Cognitive IoT Networks
1. Auflage 2020
ISBN: 978-3-030-42573-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 182 Seiten
Reihe: Internet of Things
ISBN: 978-3-030-42573-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book gathers state-of-the-art research contributions written by academics and researchers, which address emerging trends in system design and implementation for the Internet of Things (IoT), and discuss how to promote IoT technologies and applications. The book is chiefly intended for researchers and academics who want to get caught up with the latest trends in enabling technologies for IoT and related applications and services. However, it also includes chapters on the fundamentals of IoT, offering essential orientation for general readers.
Dr. Mohammad A Matin is a Professor of the Department of Electrical and Computer Engineering at North South University (NSU), where he has been since 2008. He was first appointed as Assistant Professor and then promoted to Associate Professor in 2011 and later on Professor at North South University. While in that post, he was also the coordinator of EEE program. During 2012-2017, he was an Associate Professor at Universiti Teknologi Brunei (UTB), Brunei Darussalam. He received his B.Sc. degree in Electrical and Electronic Engineering from BUET (Bangladesh), M.Sc. degree in Digital Communication from Loughborough University, UK and PhD in Wireless Communication from Newcastle University, UK. Dr. Matin has been a visiting academic staff at the National University of Malaysia (UKM), University of Malaya (UM), etc. He has published over 90 peer-reviewed journal and conference papers. He is the author/editor of 14 (fourteen) academic books and 13 (thirteen) book chapters. Dr. Matin serves as a referee or member of the editorial board for several international journals including IEEE Communications Magazine. He has received a number of Prizes and Scholarships including the Best Student Prize (Loughborough University), Commonwealth Scholarship, and Overseas Research Scholarship (ORS) conferred by the Committee of Vice Chancellors and Principals (CVCP) in the UK.
Autoren/Hrsg.
Weitere Infos & Material
1;Acknowledgements;6
2;Contents;7
3; Introduction;8
3.1;1 Introduction;8
3.2;2 Outline of Contributions;9
3.3;References;11
4; Current Research Trends on Cognitive Radio Based Internet of Things (IoT);12
4.1;1 Introduction;12
4.2;2 Research Trends on Cognitive Radio Based IoT (CR-IoT);14
4.2.1;2.1 Cognitive Radio Based IoT Architecture;14
4.2.2;2.2 Spectrum Sensing and Sharing for CR-IoT;16
4.2.3;2.3 Adaptation of Transmission Parameter in CR-IoT;18
4.2.4;2.4 Energy Management in CR-IoT;18
4.2.5;2.5 Security and Reliability for CR-IoT;19
4.3;3 Research Challenges in CR-IoT;20
4.4;4 Recommendations for Future Research in CR-IoT;20
4.5;5 Conclusion;21
4.6;References;22
5; Cognition Radio Enabled IoT;25
5.1;1 Introduction;26
5.2;2 Major Functionalities and Challenges with IoT;27
5.3;3 Major Functionalities and Challenges with Cognitive Radio;30
5.4;4 IoT and CR Frameworks;31
5.5;5 CR Enabled IoT;33
5.6;6 Conclusion;36
5.7;References;37
6; SDN-Enabled IoT: Ensuring Reliability in IoT Networks Through Software Defined Networks;38
6.1;1 Introduction;39
6.2;2 Related Work;41
6.2.1;2.1 Failure Recovery Mechanisms;41
6.2.2;2.2 Failure Recovery in SDN;42
6.3;3 Proposed Solutions for Link and Node Recovery;42
6.4;4 Link Recovery Solution for SDN-Enabled IoT;43
6.4.1;4.1 CoD Recovery Approach;44
6.4.2;4.2 LIm Recovery Approach;44
6.4.3;4.3 ICoD Mechanism;45
6.4.4;4.4 Performance Evaluation;46
6.5;5 Rapid and Robust Node Recovery of Data Traffic in SDN-Enabled IoT Networks;48
6.5.1;5.1 Reactive Approach;48
6.5.2;5.2 Proactive Approach;50
6.5.3;5.3 Hybrid Approach;50
6.5.4;5.4 Performance Evaluation;51
6.6;6 Conclusion;56
6.7;References;57
7; QoS Aware Spectrum Selection for IoT;59
7.1;1 Introduction;59
7.2;2 Related Works;60
7.3;3 QoS Aware Spectrum Allocation;61
7.3.1;3.1 QoS Requirement Model;63
7.3.2;3.2 Spectrum Capability Model;64
7.3.3;3.3 QoS Aware Spectrum Selection;64
7.4;4 Evaluation;66
7.5;5 Conclusion;67
7.6;References;68
8; Cognitive M2M Communications: Enablers for IoT;70
8.1;1 Introduction;70
8.2;2 Overview of Cognitive M2M Communications;72
8.2.1;2.1 MAC Layer Protocols of Cognitive M2M;72
8.2.2;2.2 Advantages of Cognitive M2M;78
8.3;3 Cognitive M2M as Enabler for IoT;78
8.4;4 Applications of Cognitive M2M Communication;79
8.4.1;4.1 Home Multimedia Distribution and Sharing;79
8.4.2;4.2 Intelligent Transportation Systems;79
8.4.3;4.3 eHealthcare;80
8.4.4;4.4 Environmental Monitoring;81
8.4.5;4.5 Smart Grid;81
8.5;5 Conclusion;81
8.6;References;81
9; Cognitive Radio Engine Design for IoT Using Monarch Butterfly Optimization and Fuzzy Decision Making;83
9.1;1 Introduction;83
9.2;2 Problem Formulation;85
9.2.1;2.1 Cognitive Radio Engine Objectives;86
9.2.2;2.2 Best Compromised Solution;88
9.3;3 Monarch Butterfly Optimization;89
9.3.1;3.1 Migration Operator;89
9.3.2;3.2 Butterfly Adjusting Operator;90
9.3.3;3.3 GCMBO;90
9.4;4 Numerical Results;91
9.4.1;4.1 Best Compromised Solutions;97
9.5;5 Conclusion;100
9.6;References;100
10; Physical Layer Security of Cognitive IoT Networks;103
10.1;1 Introduction;104
10.2;2 Evolution of Cognitive IoT Networks;105
10.3;3 Security Requirements;106
10.3.1;3.1 Secrecy;107
10.3.2;3.2 Authentication;107
10.3.3;3.3 Data Integrity Awareness;108
10.3.4;3.4 Robustness;108
10.4;4 Attack Types;108
10.4.1;4.1 Physical Attacks;109
10.4.2;4.2 Attacks on Compromise of Credentials;111
10.4.3;4.3 Networking Attacks;112
10.5;5 Attacks on the Cognitive Access;113
10.5.1;5.1 Impact of the Cognitive Access;113
10.5.2;5.2 Primary User Emulation Attacks;115
10.5.3;5.3 Sensing Data Falsification Attacks;116
10.5.4;5.4 Objective Function Attacks;116
10.5.5;5.5 Jamming Attacks;117
10.5.6;5.6 Eavesdropping Attacks in CIoT;117
10.6;6 Case Study;118
10.6.1;6.1 Network Model;118
10.6.2;6.2 Trust Calculation;119
10.6.3;6.3 Beamforming-Based Attack Prevention;120
10.7;7 Conclusions and Open Issues;121
10.8;References;123
11; Internet of Energy Harvesting Cognitive Radios;126
11.1;1 Introduction;127
11.2;2 Background;129
11.2.1;2.1 Requirements of Big Data-Enabled IoT;129
11.2.2;2.2 Cognitive Radio Communications for Big Data-Enabled IoT;129
11.2.3;2.3 Energy Harvesting Communications for Big Data-Enabled IoT;130
11.3;3 Motivations for Using Energy Harvesting Cognitive Radios in Big Data-Enabled IoT;131
11.3.1;3.1 Motivations for Spectrum-Aware Communications;131
11.3.2;3.2 Motivations for Self-sustaining Communications;132
11.4;4 Internet of Energy Harvesting Cognitive Radios;133
11.4.1;4.1 Energy Harvesting Methods in Big Data-Enabled IoT;133
11.4.2;4.2 Applications of Cognitive Radio in Big Data-Enabled IoT;138
11.4.3;4.3 Challenges Posed by Internet of Energy Harvesting Cognitive Radios;139
11.4.4;4.4 Integration of Energy Harvesting Cognitive Radios with the Internet;141
11.5;5 General Framework of IoEH-CRs for Big Data Applications;142
11.5.1;5.1 Operation Overview;142
11.5.2;5.2 Node Architecture;143
11.5.3;5.3 Network Architecture;145
11.5.4;5.4 Discussion on Existing and Future Applications of IoEH-CRs for Big Data;146
11.6;6 Conclusion;147
11.7;References;149
12; Cultural IoT Framework Focusing on Interactive and Personalized Museum Sightseeing;152
12.1;1 Introduction;153
12.2;2 IoT Interactive Museums;154
12.3;3 Related Work on Cognitive IoT Museum Services;156
12.4;4 Related Work on System Architecture of Smart Museums;157
12.5;5 IRME Framework Services and Protocols;161
12.6;6 IRME Communication Protocols and Services Interoperability;169
12.6.1;6.1 Data Exchange Protocol of the Thematic Tour and Interactive Services;169
12.6.2;6.2 Navigation Service Protocol;170
12.6.3;6.3 Cognitive Service Protocol;171
12.6.4;6.4 Enhanced, Augmented Projection Protocol;173
12.6.5;6.5 Haptic Protocol;175
12.6.6;6.6 3D Modeling and Printing Protocol;177
12.7;7 Conclusions;178
12.8;References;179




