Atjaunināt sīkdatņu piekrišanu

Cloud Network Management: An IoT Based Framework [Hardback]

Edited by (NIIT University, Rajasthan, India), Edited by (IIT Kharagpur, India)
  • Formāts: Hardback, 290 pages, height x width: 234x156 mm, weight: 548 g, 60 Tables, black and white; 69 Illustrations, black and white
  • Izdošanas datums: 27-Oct-2020
  • Izdevniecība: Chapman & Hall/CRC
  • ISBN-10: 0367256053
  • ISBN-13: 9780367256050
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 145,75 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Hardback, 290 pages, height x width: 234x156 mm, weight: 548 g, 60 Tables, black and white; 69 Illustrations, black and white
  • Izdošanas datums: 27-Oct-2020
  • Izdevniecība: Chapman & Hall/CRC
  • ISBN-10: 0367256053
  • ISBN-13: 9780367256050
Citas grāmatas par šo tēmu:
Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks, where data is easily accessible and available.

This book provides a framework for the next generation of cloud networks, which is the emerging part of 5G partnership projects. This contributed book has following salient features,











A cloud-based next generation networking technologies.





Cloud-based IoT and mobility management technology.

The proposed book is a reference for research scholars and course supplement for cloud-IoT related subjects such as distributed networks in computer/ electrical engineering.

Sanjay Kumar Biswash is working as an Assistant professor in NIIT University, India. He held Research Scientist position, Institute of Cybernetics, National Research Tomsk Polytechnic University, Russia. He was PDF at LNCC, Brazil and SDSU, USA. He was a visiting researcher to the UC, Portugal.

Sourav Kanti Addya is working as an Assistant professor in NITK, Surathkal, India. He was a PDF at IIT Kharagpur, India. He was a visiting scholar at SDSU, USA. He obtained national level GATE scholarship. He is a member of IEEE, ACM.
Foreword xv
Preface xvii
Editors xix
Contributors xxi
Abstract xxiii
I Evolution of IoT, Cloud Network and Network Mobility
1(46)
1 Evolution of Cloud-Fog-IoT Interconnection Networks
3(12)
Anurag Satpathy
1.1 Introduction
4(2)
1.2 Motivation and Contributions
6(1)
1.3 Evolution of Traditional cloud networks
7(2)
1.4 Into the Fog
9(1)
1.5 IoT-Fog-Cloud Interplay
9(4)
1.5.1 Challenges in IoT-Fog-Cloud Interplay
10(1)
1.5.1.1 Resource Management
10(1)
1.5.1.2 Inter-and Intra-Stratum Communication
11(1)
1.5.1.3 Cloud-Fog Federation
11(1)
1.5.2 Applications of IoT-Fog-Cloud Interplay
11(1)
1.5.2.1 Healthcare Applications
12(1)
1.5.2.2 Connected Vehicles
12(1)
1.5.2.3 Smart City Applications
13(1)
1.6 Research Challenges and Solution Approach
13(1)
1.7 Conclusion
14(1)
2 Edge or Cloud: What to Choose?
15(12)
Arnab K. Paul
2.1 Introduction
16(1)
2.2 Background & Related Work
17(1)
2.2.1 Edge-Based Learning
17(1)
2.2.2 Cloud Computing
17(1)
2.2.3 K-Means
18(1)
2.3 Experiment
18(1)
2.3.1 Edge-Based Learning Procedure
18(1)
2.3.2 Cloud-Based Learning Procedure
18(1)
2.3.3 Experimental Objectives
19(1)
2.3.4 Setup
19(1)
2.4 Analysis
19(4)
2.4.1 CPU Utilization
19(1)
2.4.2 Memory Utilization
19(2)
2.4.3 Data Transmission Rate
21(1)
2.4.4 Power Consumption
21(1)
2.4.5 Energy Consumption
22(1)
2.4.6 Summary
22(1)
2.5 Findings
23(2)
2.5.1 Edge-Based Learning
23(1)
2.5.2 Cloud-based Learning
24(1)
2.5.3 Comparison
24(1)
2.6 Conclusion
25(2)
3 The Survey, Research Challenges, and Opportunities in ICN
27(20)
Supratik Banerjee
Japan Naskar
Sanjay Kumar Biswash
3.1 Introduction
28(1)
3.2 Internet architecture and working
29(2)
3.2.1 Research challenges and issues
30(1)
3.3 Information-Centric Networks (ICN)
31(14)
3.3.1 Important terminologies used in ICN
31(1)
3.3.2 Concepts and components of Information-Centric Networking
32(1)
3.3.2.1 ICN Naming Scheme
32(1)
3.3.2.2 Routing in ICN
32(2)
3.3.2.3 In-Network Caching
34(1)
3.3.3 ICN Architectures
34(1)
3.3.3.1 Data-Oriented Network Architecture (DONA)
34(1)
3.3.3.2 Named-data Networking
34(4)
3.3.3.3 Other architectures
38(1)
3.3.4 Information-Centric Networking based Internet-of- Things
38(1)
3.3.4.1 Why ICN for IoT?
38(1)
3.3.4.2 IoT Architecture Requirements
39(2)
3.3.4.3 Significance of ICN for IoT
41(1)
3.3.4.4 IoT Requirements Mapping to ICN Characteristics
42(1)
3.3.4.5 ICN-loT network architectures
43(1)
3.3.4.6 In-network Computation in Edge Computing and Cloud Computing
44(1)
3.4 Conclusion
45(2)
II Standards and Protocol
47(82)
4 Security in Cloud-Based IoT
49(18)
Monjur Ahmed
Nurul I. Sarkar
4.1 Introduction
50(1)
4.2 Motivation and Contribution
50(1)
4.3 Research Method and Research Challenge
51(1)
4.4 Cloud-based IoT: Technologies and Design Issues
52(4)
4.4.1 Design Issues
53(3)
4.5 Cloud-Based IoT: Security Threats
56(5)
4.5.1 Cloud Security Threats
58(2)
4.5.2 IoT and Cloud-based IoT Security Threats
60(1)
4.6 Implementation aspects of Cloud-based IoT
61(3)
4.7 Concluding Remarks
64(3)
5 Cloud Enabled Body Area Network
67(20)
Anupam Pattanayak
Subhasish Dhal
5.1 Abstract
67(1)
5.2 Introduction
68(4)
5.3 Bio-Sensor Nodes
72(1)
5.4 Body Area Network
73(4)
5.4.1 Communication Architecture
75(1)
5.4.2 Physical and MAC Layers of BAN
75(2)
5.5 Cryptographic Building Blocks
77(2)
5.5.1 Cryptographic Hash Function
77(1)
5.5.2 Homomorphic Encryption
77(1)
5.5.3 Bilinear Pairing
78(1)
5.5.4 Attribute Based Encryption
78(1)
5.6 Privacy and Security
79(4)
5.6.1 Security Notions in Cloud-enabled BAN
79(1)
5.6.2 Attacks and Threats in Cloud-enabled BAN
80(1)
5.6.3 Existing Security and Privacy Solutions in Cloud-enabled BAN
81(2)
5.7 Authentication in BAN
83(1)
5.8 Key Management in BAN
84(1)
5.9 Conclusion
84(3)
6 Trust and Access Controls in IoT to Avoid Malicious Activity
87(18)
Yenumula B. Reddy
Shahram Latifi
6.1 Introduction
88(2)
6.2 Threats, Vulnerabilities, and Access control Requirement in Internet of Things
90(3)
6.2.1 Threats
90(1)
6.2.2 Vulnerabilities
91(1)
6.2.3 The importance of Access controls and Trust of users
92(1)
6.3 Literature Review
93(2)
6.4 Problem formation
95(2)
6.4.1 Improved Trust calculation
96(1)
6.5 Simulations
97(3)
6.6 Access Controls on Sensitive Data
100(3)
6.6.1 Algorithm 1
101(1)
6.6.2 Algorithm 2
102(1)
6.7 Conclusions
103(2)
7 A Layered Internet of Things (IoT) Security Framework: Attacks, Counter Measures and Challenges
105(24)
Garg
Preeti Mishra
R.C. Joshi
7.1 Introduction
107(2)
7.2 Related Work
109(2)
7.3 Taxonomy of IoT Attacks
111(7)
7.3.1 Physical Layer Attacks (PLA)
111(1)
7.3.1.1 Physical Node Tampering
112(1)
7.3.1.2 Malicious Node Injection
112(1)
7.3.1.3 RFID Tag Cloning
112(1)
7.3.2 Wireless Sensor Network Layer Attacks (NLA)
112(1)
7.3.2.1 Jamming Attack
113(1)
7.3.2.2 Side Channel Attack
113(1)
7.3.2.3 MAC Spoofing
113(1)
7.3.3 Data Sensing and Acquisition Layer Attacks (DSAL)
113(1)
7.3.3.1 Malicious Code
113(1)
7.3.3.2 Traffic Monitoring
114(1)
7.3.3.3 Inefficient Logging
114(1)
7.3.4 Internet Layer Attacks (ILA)
114(1)
7.3.4.1 Jamming Attack
114(1)
7.3.4.2 False Routing
114(1)
7.3.4.3 Alteration and Spoofing
115(1)
7.3.5 Service Layer Attacks (SLA)
115(1)
7.3.5.1 Account Hijacking
115(1)
7.3.5.2 VM Escape
115(1)
7.3.5.3 Malicious VM Creation
116(1)
7.3.6 Data Abstraction Layer Attacks (DAIA)
116(1)
7.3.6.1 Malicious node Injection
116(1)
7.3.6.2 Improper Queries
116(1)
7.3.6.3 Malicious Insider
117(1)
7.3.7 Interface Layer Attacks (ILA)
117(1)
7.3.7.1 Reverse Engineering
117(1)
7.3.7.2 Reprogramming Attack
118(1)
7.3.7.3 DDoS Attack
118(1)
7.4 Proposed IoT Security Framework
118(4)
7.4.1 Perception Layer
119(1)
7.4.2 Wireless Sensor Network Layer
120(1)
7.4.3 Data Sensing and acquisition layer
120(1)
7.4.4 Internet Layer
120(1)
7.4.5 Service Layer
121(1)
7.4.6 Data Abstraction Layer
121(1)
7.4.7 Interface Layer
121(1)
7.5 Case Study: Implementation of Denial of Service Attack in Home Automation
122(4)
7.5.1 A brief description of attack
122(1)
7.5.2 Experimental Test-bed Details
123(1)
7.5.3 Execution Steps
123(3)
7.6 Research and Challenges
126(1)
7.7 Conclusion
127(2)
III Engineering and Applications for IoT Cloud Network
129(94)
8 A Novel Framework of Smart Cities Using Internet of Things (IoT): Opportunities and Challenges
131(20)
Rahul Chauhan
Preeti Mishra
R.C. Joshi
8.1 Introduction
132(5)
8.1.1 IoT infrastructure for smart city
134(1)
8.1.1.1 Network centric IoT
134(1)
8.1.1.2 Cloud centric IoT
135(1)
8.1.1.3 Data Centric IoT
135(1)
8.1.1.4 Human Centric IoT
136(1)
8.2 Smart City Hierarchy
137(2)
8.2.1 Associated communication technology for realizing smart cities
139(1)
8.3 Proposed Framework
139(8)
8.3.1 Sensing Layer
141(1)
8.3.2 Data Abstraction layer
141(2)
8.3.3 Base station layer
143(1)
8.3.4 Edge server layer
144(1)
8.3.5 Cloud computing layer
145(1)
8.3.6 Application layer
146(1)
8.4 Case Study
147(1)
8.4.1 Smart traffic management
147(1)
8.4.2 Smart Healthcare
147(1)
8.5 Open Challenges and opportunities
148(2)
8.6 Conclusion
150(1)
9 Interoperability and Information-Sharing Paradigm for IoT-Enabled Healthcare
151(24)
Brian Desnoyers
Kendall Weistroffer
Jenna Hallapy
Sandeep Pisharody
9.1 Introduction
153(1)
9.2 Mobile Health and the Internet of Medical Things
154(1)
9.3 Enabling Precision & Personalized Medicine
155(1)
9.4 Health Data Ownership in IoT and the Cloud
156(8)
9.4.1 IoT Data Ownership Challenges
157(1)
9.4.1.1 Consent for Data Capture
157(1)
9.4.1.2 Verifying Data Ownership: Local Identity Management and Authentication
158(2)
9.4.2 Healthcare Data Ownership
160(1)
9.4.2.1 Electronic Health Record (EHR)
161(1)
9.4.2.2 Personal Health Record
161(1)
9.4.2.3 Bridging Medical Data Ownership: Combining EHR and PHR
162(2)
9.5 Enabling IoMT Information Sharing in Healthcare
164(6)
9.5.1 Collecting Data from IoMT Devices
164(1)
9.5.2 Traditional Health Record Information Exchange for Information Federation
165(1)
9.5.2.1 Regulating Provider Access to PHR Data
165(1)
9.5.2.2 Providing Emergency Data Access
165(2)
9.5.3 Ensuring Data Integrity from IoMT Sensors
167(1)
9.5.4 Privately Replicating and Sharing Large Datasets
167(1)
9.5.5 Maintaining Consensus in Large-Scale Federated Systems
168(1)
9.5.6 Providing Emergency Access to Real-Time IoMT Data
169(1)
9.6 Achieving Heterogeneous Data Interoperability
170(3)
9.6.1 Interoperability Architecture Overview
170(1)
9.6.2 Current Interoperability Standards
171(1)
9.6.3 Future Standards and Alternative Methods
172(1)
9.7 Challenges & Opportunities
173(2)
10 Cloud Computing Based Intelligent Healthcare System
175(12)
Sunita Pattanayak
10.1 Introduction
176(1)
10.2 Building an intelligent healthcare system
177(1)
10.3 Early detection and prediction of brain tumor using Intelligent Cloud
178(2)
10.3.1 Classification using different models
179(1)
10.3.2 Image Inversion
179(1)
10.4 Experiments and Results
180(5)
10.4.1 Naive Bayes Classifier Model
182(1)
10.4.2 CNN Model
183(1)
10.4.3 Image Inversion
183(2)
10.4.4 Summary and Discussion
185(1)
10.5 Research Challenges and possible solutions
185(1)
10.6 Conclusion
186(1)
10.7 Acknowledgement
186(1)
11 IoT Cloud Network for Healthcare
187(36)
Ashok Kumar Pradhan
E. Bhaskara Santhosh
S. Priyanka
11.1 Introduction to modern health computing
189(2)
11.2 Overcoming the challenges
191(2)
11.2.1 Security and privacy of patient data
191(1)
11.2.2 Lack of uniformity among connected mobile devices
191(1)
11.2.3 Vulnerable data transmissions
192(1)
11.2.4 Patient readiness
192(1)
11.2.5 Awareness about IoTs
192(1)
11.2.6 Paralysis of Data Analysis
192(1)
11.3 Cloud computing over the intelligent healthcare system
193(1)
11.4 IoT and smart health system paradigms
194(9)
11.4.1 History of IoT in healthcare
194(1)
11.4.2 Role of IoT in Healthcare
194(1)
11.4.3 Challenges of IoT in healthcare
195(1)
11.4.4 Future of IoT in healthcare
196(1)
11.4.5 Patient-centered care
196(2)
11.4.6 Teleconsultation and Remote Patient monitoring
198(1)
11.4.7 Wearable sensors
199(1)
11.4.8 Insideable devices
199(1)
11.4.9 Mobile apps
200(1)
11.4.10 Electronic Medical Records (EMR)
200(1)
11.4.11 Health portals
200(1)
11.4.12 Big data
200(1)
11.4.13 The human genome project
201(1)
11.4.14 Personalized and precision medicine
201(1)
11.4.15 3D Printing
202(1)
11.4.16 Artificial intelligence in healthcare
202(1)
11.5 New Design and Performance of IoT cloud for Smart Healthcare and Monitor system
203(20)
11.5.1 Disruptions in Internet
205(1)
11.5.2 Diversity of Protocols
205(1)
11.5.3 No Special Testing Tools Were Made for Healthcare Applications
206(1)
11.5.4 Difficulties in Performing Healthcare IoT Performance Testing
206(1)
11.5.5 Mobile technology in revolution of Smart Healthcare
207(1)
11.5.6 Financial challenges
207(1)
11.5.7 SaaS helps improve delivery of Hospital services
208(1)
11.5.8 The benefits of cloud computing
209(1)
11.5.9 Cloud security and regulatory compliance
210(1)
11.5.10 Spend less money, serve more patients
210(1)
11.5.11 mHealth in action
211(1)
11.5.11.1 IoMT Platforms
211(2)
11.5.11.2 Amazon Web Services IoT
213(1)
11.5.11.3 Qualcomm Life
214(1)
11.5.11.4 Data Flow
215(1)
11.5.11.5 Azure IoT Suite
215(2)
11.5.11.6 Intel IoT
217(1)
11.5.12 Compliance and Regulations
218(1)
11.5.12.1 HIPAA Rules
218(1)
11.5.12.2 HITECH Act
218(1)
11.5.12.3 HITRUST
219(1)
11.5.12.4 PCI
219(1)
11.5.13 What We See in Future
219(1)
11.5.13.1 Healthcare Robots
219(1)
11.5.13.2 The Brain-Computer Interface
220(3)
Bibliography 223(34)
Index 257
Sanjay Kumar Biswash received his Ph. D, a degree from the Indian Institute of Technology (Indian School of Mines), Dhanbad, in 2012. Dr. Biswash currently working as a Assistant professor in NIIT University, Neemrana, India. He held Research Scientist position in Department of Computer Science and Robotics, Institute of Cybernetics, National Research Tomsk Polytechnic University, Russia. The PostDoctorate experience from the National Laboratory of Scientific Computing (LNCC), RJ Brazil, and San Diego State University, CA, USA. He was a visiting researcher to the University of Coimbra, Portugal. He served as an Assistant Professor (on contract) at the Motilal Nehru National Institute of Technology, Allahabad, India. His research interests lie on Network Management, Mobility Management, 5G, Devicecentric Networks, Wireless and Mobile Networks QoS/QoE, Fog and Edge Networks, and Bioinspired Networks. He serves as an editorial board member for Wireless Personal Communications, Journal of Mobile and Network Applications and reviewer of many reputed international journals and conferences such as IEEE TPDS, IEEE System, IEEE Networks, Elsevier COMNET, Elsevier JNCA, IEEE ICC, IEEE WCNC etc.

Sourav Kanti Addya received his Ph.D in Department of Computer Science & Engineering from National Institute of Technology, Rourkela, India. Dr. Addya currently working as an Assistant professor in Department of Computer Science & Engineering at National Institute of Technology Karnataka, Surathkal, India. Prior to join NIT Karnataka, he was a PostDoctoral fellow in Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur, India. He was a visiting scholar at San Diego State University, CA, USA. He obtained his M.Tech degree with national level GATE scholarship, form NIT Rourkela, India and B. Tech form the West Bengal University of Technology. He has several international collaborations and sound volunteer research experience as a reviewer of reputed international journals and TPC member of international conferences such as Mobile Networks and Applications, Springer, IEEE Systems Journal, IEEE Transactions on Sustainable Computing, IEEE Transactions on Dependable and Secure Computing, Computers & Electrical Engineering, Elsevier, COMSNETS 2020, IOTSm 2018, GLOBECOM 2015 etc. He has a multidisciplinary research and technical interests include Cloud and distributed system, Blockchain, Algorithm design, Computer networks, Information security. Dr. Addya is a member of IEEE, ACM and Life member of Cryptology Research Society of India (CRSI).