You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critic...
The Social Internet of Things (SIoT) has become a hot topic in academic research. It employs the theory of social networks into the different levels of the Internet of Things (IoTs) and has brought new possibilities for the development of IoTs. Essentially, the SIoT is a subset of IoTs. It uses intelligent hardware and humans as the node, a social network as the organization type, the social relationship between things, things and humans, and between humans, formatting research methods and models with social network characteristics to realize the connection, service, and application of the IoTs. Moreover, SIoT is a form of realization of technology, architecture, and application of the IoTs ...
The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based ...
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27–28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field. The technical aspects of IoT are thoroughly discussed, including the implementation of cutting-edge sensors, data communication protocols, and network topologies. The book also covers the latest advancements in areas such as edge computing, 5G networks, and AI-powered IoT devices. Emphasis is placed on the examination of IoT in real-world applications, including healthcare, agriculture, transportation, and home automation. Other highlights of the book include: IoT-based systems for monitoring air an...
The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision IoT Integration Information Storage IoT Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.
Advanced IoT based wireless communication has recently received a lot of attention due to a wide range of industry 4.0 applications such as security solutions of CPS in vehicular communication, E_Healthcare over secure wireless communication, privacy issues of E_Learning via cost and energy efficient wireless network communication, etc. In these applications, physical data is continuously monitored by the IoT-based sensor nodes to facilitate the current situations, 5G network management, security solutions, etc. in industry 4.0 environment. Despite the many security issues considered in existing wireless communication in the industry 4.0 applications, IoT based 5G and 5G+ wireless communicat...
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies and network security.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
This book covers need for 6G connectivity arising from the pursuit of higher data speeds, ultra-low latency, massive IoT connectivity, enhanced spectral efficiency, and the facilitation of new and transformative applications. By addressing these drivers and expectations, 6G aims to revolutionize wireless communication, opening up a realm of possibilities for industries, societies, and individuals. Technological improvements and evolutions are required beyond fifth-generation (5G) networks for wireless communications as well as in the industry where the involvement of collaborative robots (COBOT) will satisfy the personal needs of human beings as and when required leading to human–machine interactions. A considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous, future-generation networks such as 6G. Technical topics discussed in the book include: Network security and attacks 6G applications and Industry 5.0 Human centric interface Green computing in wireless cellular networks Next generation networks (IOT, Cloud Computing, Big Data, etc.)