Internet of Things

Saved in:
Bibliographic Details
Main Authors Acharjya, D. P, Geetha, M. Kalaiselvi
Format eBook
LanguageEnglish
Published Cham Springer International Publishing AG 2017
Edition1
Subjects
Online AccessGet full text
ISBN331953470X
9783319534701

Cover

Table of Contents:
  • Mobility Support and Service Discovery for Industrial Process Monitoring -- 1 Introduction -- 2 State of the Art -- 2.1 Wireless Sensor Networks -- 2.2 Industrial Middleware -- 3 The OCARI Wireless Sensor Network -- 3.1 Mobility Support -- 4 The OPC-UA/ROSA Middleware -- 4.1 The ROSA Overlay Network -- 4.2 The Link Between OPC-UA and ROSA -- 4.3 The Link Between OCARI and OPC-UA -- 5 The KASEM Predictive Maintenance System -- 6 Implementation and Use Cases -- 6.1 The OCARI Development Platform -- 6.2 Sensor Nodes Supported -- 6.3 OCARI Tuning -- 7 Conclusion -- References -- MAC Protocols in Body Area Network-A Survey -- 1 Introduction -- 2 Communications in Body Area Network -- 3 Challenges and Research Issues in Body Area Network -- 4 IEEE Sandard for Body Area Network -- 5 MAC Techniques for Reliable and Efficient Body Area Network -- 5.1 Scheduled Time Division Multiple Access MAC Protocol -- 5.2 Polling Based MAC Protocol -- 5.3 Random Access MAC Protocol -- 5.4 Preemption Enhanced Distributed Channel Access Priority MAC Protocol -- 5.5 Sensor MAC -- 5.6 Traffic Adaptive MAC -- 5.7 X-MAC -- 5.8 Medical MAC (M-MAC) -- 6 Implications for Researchers and Practitioners -- 7 Conclusion -- References -- Internet of Nano Things and Industrial Internet of Things -- 1 Introduction -- 2 Internet of Nano Things -- 2.1 Architecture of Internet of Nano Things -- 2.2 Communication Classifications -- 2.3 Communication Issues -- 2.4 Applications -- 2.5 Security Issues in IoNT -- 2.6 Future Research Directions in IoNT -- 3 Industrial Internet of Things -- 3.1 Functional Model of Industrial Internet of Things -- 3.2 Requirements for Industrial Internet of Things -- 3.3 Benefits of Industrial Internet of Things -- 3.4 Security Issues in IIoT -- 3.5 Future Research Directions in IIoT -- 4 Conclusion -- References
  • 2.5 Tracking of Night Drivers for Accident Prevention -- 2.6 IoT Based Healthcare System for Wheelchair Users -- 2.7 Smart Home for Elderly and Disabled Persons -- 3 Conclusion and Future Research -- References -- A Survey on Internet of Things: Case Studies, Applications, and Future Directions -- 1 Introduction -- 2 Architecture of IoT -- 2.1 Findings of IoT -- 2.2 Challenges -- 3 Applications of Internet of Things -- 3.1 Smart Traffic System -- 3.2 Smart Environment -- 3.3 Smart Home -- 3.4 Healthcare Monitoring Applications -- 3.5 Logistics and Supply Chain Management -- 4 Case Study on Multi Robot System -- 5 Case Study on Emergency Department in Hospitals -- 6 Internet of Things Future Vision -- 7 Conclusion -- References -- Internet of Things in Cloud Computing -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Computing Models -- 3 Internet of Things -- 3.1 Classifications of Internet of Things -- 3.2 Applications of Internet of Things -- 3.3 Security and Challenges in Internet of Things -- 3.4 Future Research Directions in Internet of Things -- 3.5 Practical System in Internet of Things -- 4 Internet of Things in the Cloud -- 4.1 Challenges to Enable Internet of Things in Cloud Computing -- 4.2 Future Research Directions -- 5 Conclusion -- References
  • 1 Introduction -- 2 Distributed Storage Systems -- 2.1 Types of Distributed Storage Systems -- 2.2 Distributed Storage Architectures -- 3 Data Fusion in Distributed Storage Systems -- 4 Privacy and Security -- 5 Trust in Distributed Storage Systems -- 6 Conclusion -- References -- Part III Challenges, Issues and Healthtcare Applications of Internet of Things -- Internet of Things Based Intelligent Elderly Care System -- 1 Introduction -- 2 Visual Information Representation and Fall Detection Approaches -- 3 Fall Detection Framework - Overview -- 3.1 Feature Description -- 3.2 Support Vector Machines -- 3.3 K-Nearest Neighbor -- 3.4 Decision Tree -- 3.5 Fall Detection Dataset -- 3.6 Motion Projection Profile with SVM -- 3.7 Motion Projection Profile with K-NN -- 3.8 Motion Projection Profile with Decision Tree (J48) -- 4 Future Research Directions -- 5 Conclusion -- References -- Challenges, Issues and Applications of Internet of Things -- 1 Introduction -- 2 General Architecture of IoT -- 2.1 Applications -- 3 Advantages and Limitations -- 4 Implementation Challenges and Issues -- 5 Future Research Directions -- 6 Conclusion -- References -- Application of Technologies in Internet of Things -- 1 Introduction -- 2 Basic Working Principle of IoT -- 3 Technologies in IoT -- 3.1 Sensor Technology -- 3.2 Communication Technology -- 3.3 Middleware Technology -- 3.4 Cloud Computing Technology -- 4 Technologies of IoT in Medical -- 4.1 Research Projects -- 5 Conclusion and Future Challenges -- References -- Part IV Industry and Societal Applications of Internet of Things -- An Appraisal on Human-Centered Internet of Things -- 1 Introduction -- 2 Case Studies of Human Centered IoT -- 2.1 Drug Tracker for Patient Safety -- 2.2 IoT Embedded Systems for Disabled Persons -- 2.3 Elderly People Care Using IoT -- 2.4 IoT Support for Children Affected by ASD
  • Intro -- Preface -- Acknowledgements -- Contents -- Contributors -- Acronyms -- Part I Fundamentals and Architecture of Internet of Things -- Relay Technology for 5G Networks and IoT Applications -- 1 Introduction -- 2 Relay Classification -- 2.1 Classification Based on Layers -- 2.2 Classification Based on Duplexing Schemes -- 2.3 Classification Based on Resources Assignment -- 2.4 3GPP Classification -- 3 Potential Benefits of Relaying -- 3.1 Relay to Improve Channel Reliability -- 3.2 Relay to Improve System Throughput -- 3.3 Relay to Improve Service Continuity -- 3.4 Relay for Offloading and Load Sharing -- 3.5 Relay to Reduce Operational Costs -- 4 Relay Deployment Strategies in 5G Networks -- 4.1 Multi-hop Relay -- 4.2 Mobile Relay -- 4.3 Heterogeneous Relay -- 4.4 Relay Aassisted D2D Communication -- 4.5 Multiple Backhaul Relay -- 5 Future Challenges and Research Directions -- 5.1 Radio Resource Allocation -- 5.2 Power Control -- 5.3 Admission Control -- 5.4 Relay Selection -- 5.5 Handoff -- 5.6 Routing -- 6 Fog Computing and Video Streaming Applications -- 6.1 Fog Computing Paradigm -- 6.2 Video Streaming Application -- 6.3 Simulation and Results -- 7 Conclusion -- References -- Two-Way Authentication for the Internet-of-Things -- 1 Introduction -- 2 Background Information -- 2.1 Wireless Sensor Networks and the Internet-of-Thing -- 2.2 Security Solutions for Wireless Sensor Networks -- 3 A Standard-Based End-to-End Security Architecture -- 4 DTLS Solution for Resource-Full Devices -- 4.1 DTLS Protected Message Structure -- 4.2 Certificate Structure -- 4.3 DTLS Handshake Assumption -- 4.4 Security Considerations for DTLS Handshake -- 5 Evaluation -- 5.1 Data Transfer Latency -- 5.2 Handshake Latency -- 5.3 Memory Consumption -- 5.4 Energy Consumption -- 5.5 Comparison to Related Work -- 6 Conclusion -- References
  • Part II Distributed Systems and Security in Internet of Things -- Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption -- 1 Introduction -- 2 Literature Review and Objectives -- 3 Proposed Model -- 3.1 Affine Cryptography -- 3.2 Mechanism of Selection of Keys from an Array -- 4 Experimental Work -- 4.1 Analysis -- 4.2 Memory Consumption -- 4.3 Time Consumption -- 5 Conclusion and Future Work -- References -- Recognizing Attacks in Wireless Sensor Network in View of Internet of Things -- 1 Introduction -- 2 Symptoms of Various Attacks in Wireless Sensor Network -- 2.1 Jamming -- 2.2 Hello Flood Attack -- 2.3 Selective Forwarding -- 2.4 Routing Anomalies -- 3 Protection Requirements in Wireless Sensor Networks -- 3.1 Protection Characteristics -- 3.2 Protection Systems -- 4 Analysis of Trust in Wireless Sensor Networks -- 4.1 Characteristics of Trust -- 4.2 Trust Computations -- 4.3 Trust Values -- 4.4 Classical Trusting Techniques in Wireless Sensor Networks -- 5 Trusting Technique Challenges in Wireless Sensor Networks -- 6 Modern Trusting Techniques for Wireless Sensor Network -- 6.1 Ant Colony Trusting Influence Technique -- 6.2 Clustering Based Trusting Technique -- 6.3 Key Formation Based Trusting Technique -- 7 Conclusion -- References -- Wireless Sensor Network in Automation and Internet of Things -- 1 Introduction -- 2 Wireless Sensor Network -- 2.1 Components of WSN Node -- 2.2 Creating Wireless Sensor Network -- 2.3 Classification of WSN -- 2.4 Sensors for Real Time Processing -- 2.5 Operating System -- 3 Wireless Sensor Network and IOT -- 3.1 Integration of WSN with IOT -- 3.2 Automation of WSN in IOT -- 3.3 Verdict of Automation -- 4 Green Computing and IoT -- 5 Conclusion and Future Challenges -- References -- Challenges of Distributed Storage Systems in Internet of Things