Internet of Things
Saved in:
| Main Authors | , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Cham
Springer International Publishing AG
2017
|
| Edition | 1 |
| Subjects | |
| Online Access | Get full text |
| ISBN | 331953470X 9783319534701 |
Cover
Table of Contents:
- Mobility Support and Service Discovery for Industrial Process Monitoring -- 1 Introduction -- 2 State of the Art -- 2.1 Wireless Sensor Networks -- 2.2 Industrial Middleware -- 3 The OCARI Wireless Sensor Network -- 3.1 Mobility Support -- 4 The OPC-UA/ROSA Middleware -- 4.1 The ROSA Overlay Network -- 4.2 The Link Between OPC-UA and ROSA -- 4.3 The Link Between OCARI and OPC-UA -- 5 The KASEM Predictive Maintenance System -- 6 Implementation and Use Cases -- 6.1 The OCARI Development Platform -- 6.2 Sensor Nodes Supported -- 6.3 OCARI Tuning -- 7 Conclusion -- References -- MAC Protocols in Body Area Network-A Survey -- 1 Introduction -- 2 Communications in Body Area Network -- 3 Challenges and Research Issues in Body Area Network -- 4 IEEE Sandard for Body Area Network -- 5 MAC Techniques for Reliable and Efficient Body Area Network -- 5.1 Scheduled Time Division Multiple Access MAC Protocol -- 5.2 Polling Based MAC Protocol -- 5.3 Random Access MAC Protocol -- 5.4 Preemption Enhanced Distributed Channel Access Priority MAC Protocol -- 5.5 Sensor MAC -- 5.6 Traffic Adaptive MAC -- 5.7 X-MAC -- 5.8 Medical MAC (M-MAC) -- 6 Implications for Researchers and Practitioners -- 7 Conclusion -- References -- Internet of Nano Things and Industrial Internet of Things -- 1 Introduction -- 2 Internet of Nano Things -- 2.1 Architecture of Internet of Nano Things -- 2.2 Communication Classifications -- 2.3 Communication Issues -- 2.4 Applications -- 2.5 Security Issues in IoNT -- 2.6 Future Research Directions in IoNT -- 3 Industrial Internet of Things -- 3.1 Functional Model of Industrial Internet of Things -- 3.2 Requirements for Industrial Internet of Things -- 3.3 Benefits of Industrial Internet of Things -- 3.4 Security Issues in IIoT -- 3.5 Future Research Directions in IIoT -- 4 Conclusion -- References
- 2.5 Tracking of Night Drivers for Accident Prevention -- 2.6 IoT Based Healthcare System for Wheelchair Users -- 2.7 Smart Home for Elderly and Disabled Persons -- 3 Conclusion and Future Research -- References -- A Survey on Internet of Things: Case Studies, Applications, and Future Directions -- 1 Introduction -- 2 Architecture of IoT -- 2.1 Findings of IoT -- 2.2 Challenges -- 3 Applications of Internet of Things -- 3.1 Smart Traffic System -- 3.2 Smart Environment -- 3.3 Smart Home -- 3.4 Healthcare Monitoring Applications -- 3.5 Logistics and Supply Chain Management -- 4 Case Study on Multi Robot System -- 5 Case Study on Emergency Department in Hospitals -- 6 Internet of Things Future Vision -- 7 Conclusion -- References -- Internet of Things in Cloud Computing -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Computing Models -- 3 Internet of Things -- 3.1 Classifications of Internet of Things -- 3.2 Applications of Internet of Things -- 3.3 Security and Challenges in Internet of Things -- 3.4 Future Research Directions in Internet of Things -- 3.5 Practical System in Internet of Things -- 4 Internet of Things in the Cloud -- 4.1 Challenges to Enable Internet of Things in Cloud Computing -- 4.2 Future Research Directions -- 5 Conclusion -- References
- 1 Introduction -- 2 Distributed Storage Systems -- 2.1 Types of Distributed Storage Systems -- 2.2 Distributed Storage Architectures -- 3 Data Fusion in Distributed Storage Systems -- 4 Privacy and Security -- 5 Trust in Distributed Storage Systems -- 6 Conclusion -- References -- Part III Challenges, Issues and Healthtcare Applications of Internet of Things -- Internet of Things Based Intelligent Elderly Care System -- 1 Introduction -- 2 Visual Information Representation and Fall Detection Approaches -- 3 Fall Detection Framework - Overview -- 3.1 Feature Description -- 3.2 Support Vector Machines -- 3.3 K-Nearest Neighbor -- 3.4 Decision Tree -- 3.5 Fall Detection Dataset -- 3.6 Motion Projection Profile with SVM -- 3.7 Motion Projection Profile with K-NN -- 3.8 Motion Projection Profile with Decision Tree (J48) -- 4 Future Research Directions -- 5 Conclusion -- References -- Challenges, Issues and Applications of Internet of Things -- 1 Introduction -- 2 General Architecture of IoT -- 2.1 Applications -- 3 Advantages and Limitations -- 4 Implementation Challenges and Issues -- 5 Future Research Directions -- 6 Conclusion -- References -- Application of Technologies in Internet of Things -- 1 Introduction -- 2 Basic Working Principle of IoT -- 3 Technologies in IoT -- 3.1 Sensor Technology -- 3.2 Communication Technology -- 3.3 Middleware Technology -- 3.4 Cloud Computing Technology -- 4 Technologies of IoT in Medical -- 4.1 Research Projects -- 5 Conclusion and Future Challenges -- References -- Part IV Industry and Societal Applications of Internet of Things -- An Appraisal on Human-Centered Internet of Things -- 1 Introduction -- 2 Case Studies of Human Centered IoT -- 2.1 Drug Tracker for Patient Safety -- 2.2 IoT Embedded Systems for Disabled Persons -- 2.3 Elderly People Care Using IoT -- 2.4 IoT Support for Children Affected by ASD
- Intro -- Preface -- Acknowledgements -- Contents -- Contributors -- Acronyms -- Part I Fundamentals and Architecture of Internet of Things -- Relay Technology for 5G Networks and IoT Applications -- 1 Introduction -- 2 Relay Classification -- 2.1 Classification Based on Layers -- 2.2 Classification Based on Duplexing Schemes -- 2.3 Classification Based on Resources Assignment -- 2.4 3GPP Classification -- 3 Potential Benefits of Relaying -- 3.1 Relay to Improve Channel Reliability -- 3.2 Relay to Improve System Throughput -- 3.3 Relay to Improve Service Continuity -- 3.4 Relay for Offloading and Load Sharing -- 3.5 Relay to Reduce Operational Costs -- 4 Relay Deployment Strategies in 5G Networks -- 4.1 Multi-hop Relay -- 4.2 Mobile Relay -- 4.3 Heterogeneous Relay -- 4.4 Relay Aassisted D2D Communication -- 4.5 Multiple Backhaul Relay -- 5 Future Challenges and Research Directions -- 5.1 Radio Resource Allocation -- 5.2 Power Control -- 5.3 Admission Control -- 5.4 Relay Selection -- 5.5 Handoff -- 5.6 Routing -- 6 Fog Computing and Video Streaming Applications -- 6.1 Fog Computing Paradigm -- 6.2 Video Streaming Application -- 6.3 Simulation and Results -- 7 Conclusion -- References -- Two-Way Authentication for the Internet-of-Things -- 1 Introduction -- 2 Background Information -- 2.1 Wireless Sensor Networks and the Internet-of-Thing -- 2.2 Security Solutions for Wireless Sensor Networks -- 3 A Standard-Based End-to-End Security Architecture -- 4 DTLS Solution for Resource-Full Devices -- 4.1 DTLS Protected Message Structure -- 4.2 Certificate Structure -- 4.3 DTLS Handshake Assumption -- 4.4 Security Considerations for DTLS Handshake -- 5 Evaluation -- 5.1 Data Transfer Latency -- 5.2 Handshake Latency -- 5.3 Memory Consumption -- 5.4 Energy Consumption -- 5.5 Comparison to Related Work -- 6 Conclusion -- References
- Part II Distributed Systems and Security in Internet of Things -- Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption -- 1 Introduction -- 2 Literature Review and Objectives -- 3 Proposed Model -- 3.1 Affine Cryptography -- 3.2 Mechanism of Selection of Keys from an Array -- 4 Experimental Work -- 4.1 Analysis -- 4.2 Memory Consumption -- 4.3 Time Consumption -- 5 Conclusion and Future Work -- References -- Recognizing Attacks in Wireless Sensor Network in View of Internet of Things -- 1 Introduction -- 2 Symptoms of Various Attacks in Wireless Sensor Network -- 2.1 Jamming -- 2.2 Hello Flood Attack -- 2.3 Selective Forwarding -- 2.4 Routing Anomalies -- 3 Protection Requirements in Wireless Sensor Networks -- 3.1 Protection Characteristics -- 3.2 Protection Systems -- 4 Analysis of Trust in Wireless Sensor Networks -- 4.1 Characteristics of Trust -- 4.2 Trust Computations -- 4.3 Trust Values -- 4.4 Classical Trusting Techniques in Wireless Sensor Networks -- 5 Trusting Technique Challenges in Wireless Sensor Networks -- 6 Modern Trusting Techniques for Wireless Sensor Network -- 6.1 Ant Colony Trusting Influence Technique -- 6.2 Clustering Based Trusting Technique -- 6.3 Key Formation Based Trusting Technique -- 7 Conclusion -- References -- Wireless Sensor Network in Automation and Internet of Things -- 1 Introduction -- 2 Wireless Sensor Network -- 2.1 Components of WSN Node -- 2.2 Creating Wireless Sensor Network -- 2.3 Classification of WSN -- 2.4 Sensors for Real Time Processing -- 2.5 Operating System -- 3 Wireless Sensor Network and IOT -- 3.1 Integration of WSN with IOT -- 3.2 Automation of WSN in IOT -- 3.3 Verdict of Automation -- 4 Green Computing and IoT -- 5 Conclusion and Future Challenges -- References -- Challenges of Distributed Storage Systems in Internet of Things