Foreword |
|
xv | |
Preface |
|
xvii | |
Editors |
|
xix | |
Contributors |
|
xxi | |
Abstract |
|
xxiii | |
|
I Evolution of IoT, Cloud Network and Network Mobility |
|
|
1 | (46) |
|
1 Evolution of Cloud-Fog-IoT Interconnection Networks |
|
|
3 | (12) |
|
|
|
4 | (2) |
|
1.2 Motivation and Contributions |
|
|
6 | (1) |
|
1.3 Evolution of Traditional cloud networks |
|
|
7 | (2) |
|
|
9 | (1) |
|
1.5 IoT-Fog-Cloud Interplay |
|
|
9 | (4) |
|
1.5.1 Challenges in IoT-Fog-Cloud Interplay |
|
|
10 | (1) |
|
1.5.1.1 Resource Management |
|
|
10 | (1) |
|
1.5.1.2 Inter-and Intra-Stratum Communication |
|
|
11 | (1) |
|
1.5.1.3 Cloud-Fog Federation |
|
|
11 | (1) |
|
1.5.2 Applications of IoT-Fog-Cloud Interplay |
|
|
11 | (1) |
|
1.5.2.1 Healthcare Applications |
|
|
12 | (1) |
|
1.5.2.2 Connected Vehicles |
|
|
12 | (1) |
|
1.5.2.3 Smart City Applications |
|
|
13 | (1) |
|
1.6 Research Challenges and Solution Approach |
|
|
13 | (1) |
|
|
14 | (1) |
|
2 Edge or Cloud: What to Choose? |
|
|
15 | (12) |
|
|
|
16 | (1) |
|
2.2 Background & Related Work |
|
|
17 | (1) |
|
2.2.1 Edge-Based Learning |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
2.3.1 Edge-Based Learning Procedure |
|
|
18 | (1) |
|
2.3.2 Cloud-Based Learning Procedure |
|
|
18 | (1) |
|
2.3.3 Experimental Objectives |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (4) |
|
|
19 | (1) |
|
|
19 | (2) |
|
2.4.3 Data Transmission Rate |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
2.5.1 Edge-Based Learning |
|
|
23 | (1) |
|
2.5.2 Cloud-based Learning |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
3 The Survey, Research Challenges, and Opportunities in ICN |
|
|
27 | (20) |
|
|
|
|
|
28 | (1) |
|
3.2 Internet architecture and working |
|
|
29 | (2) |
|
3.2.1 Research challenges and issues |
|
|
30 | (1) |
|
3.3 Information-Centric Networks (ICN) |
|
|
31 | (14) |
|
3.3.1 Important terminologies used in ICN |
|
|
31 | (1) |
|
3.3.2 Concepts and components of Information-Centric Networking |
|
|
32 | (1) |
|
3.3.2.1 ICN Naming Scheme |
|
|
32 | (1) |
|
|
32 | (2) |
|
3.3.2.3 In-Network Caching |
|
|
34 | (1) |
|
|
34 | (1) |
|
3.3.3.1 Data-Oriented Network Architecture (DONA) |
|
|
34 | (1) |
|
3.3.3.2 Named-data Networking |
|
|
34 | (4) |
|
3.3.3.3 Other architectures |
|
|
38 | (1) |
|
3.3.4 Information-Centric Networking based Internet-of- Things |
|
|
38 | (1) |
|
|
38 | (1) |
|
3.3.4.2 IoT Architecture Requirements |
|
|
39 | (2) |
|
3.3.4.3 Significance of ICN for IoT |
|
|
41 | (1) |
|
3.3.4.4 IoT Requirements Mapping to ICN Characteristics |
|
|
42 | (1) |
|
3.3.4.5 ICN-loT network architectures |
|
|
43 | (1) |
|
3.3.4.6 In-network Computation in Edge Computing and Cloud Computing |
|
|
44 | (1) |
|
|
45 | (2) |
|
II Standards and Protocol |
|
|
47 | (82) |
|
4 Security in Cloud-Based IoT |
|
|
49 | (18) |
|
|
|
|
50 | (1) |
|
4.2 Motivation and Contribution |
|
|
50 | (1) |
|
4.3 Research Method and Research Challenge |
|
|
51 | (1) |
|
4.4 Cloud-based IoT: Technologies and Design Issues |
|
|
52 | (4) |
|
|
53 | (3) |
|
4.5 Cloud-Based IoT: Security Threats |
|
|
56 | (5) |
|
4.5.1 Cloud Security Threats |
|
|
58 | (2) |
|
4.5.2 IoT and Cloud-based IoT Security Threats |
|
|
60 | (1) |
|
4.6 Implementation aspects of Cloud-based IoT |
|
|
61 | (3) |
|
|
64 | (3) |
|
5 Cloud Enabled Body Area Network |
|
|
67 | (20) |
|
|
|
|
67 | (1) |
|
|
68 | (4) |
|
|
72 | (1) |
|
|
73 | (4) |
|
5.4.1 Communication Architecture |
|
|
75 | (1) |
|
5.4.2 Physical and MAC Layers of BAN |
|
|
75 | (2) |
|
5.5 Cryptographic Building Blocks |
|
|
77 | (2) |
|
5.5.1 Cryptographic Hash Function |
|
|
77 | (1) |
|
5.5.2 Homomorphic Encryption |
|
|
77 | (1) |
|
|
78 | (1) |
|
5.5.4 Attribute Based Encryption |
|
|
78 | (1) |
|
|
79 | (4) |
|
5.6.1 Security Notions in Cloud-enabled BAN |
|
|
79 | (1) |
|
5.6.2 Attacks and Threats in Cloud-enabled BAN |
|
|
80 | (1) |
|
5.6.3 Existing Security and Privacy Solutions in Cloud-enabled BAN |
|
|
81 | (2) |
|
5.7 Authentication in BAN |
|
|
83 | (1) |
|
5.8 Key Management in BAN |
|
|
84 | (1) |
|
|
84 | (3) |
|
6 Trust and Access Controls in IoT to Avoid Malicious Activity |
|
|
87 | (18) |
|
|
|
|
88 | (2) |
|
6.2 Threats, Vulnerabilities, and Access control Requirement in Internet of Things |
|
|
90 | (3) |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.2.3 The importance of Access controls and Trust of users |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
6.4.1 Improved Trust calculation |
|
|
96 | (1) |
|
|
97 | (3) |
|
6.6 Access Controls on Sensitive Data |
|
|
100 | (3) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
7 A Layered Internet of Things (IoT) Security Framework: Attacks, Counter Measures and Challenges |
|
|
105 | (24) |
|
|
|
|
|
107 | (2) |
|
|
109 | (2) |
|
7.3 Taxonomy of IoT Attacks |
|
|
111 | (7) |
|
7.3.1 Physical Layer Attacks (PLA) |
|
|
111 | (1) |
|
7.3.1.1 Physical Node Tampering |
|
|
112 | (1) |
|
7.3.1.2 Malicious Node Injection |
|
|
112 | (1) |
|
|
112 | (1) |
|
7.3.2 Wireless Sensor Network Layer Attacks (NLA) |
|
|
112 | (1) |
|
|
113 | (1) |
|
7.3.2.2 Side Channel Attack |
|
|
113 | (1) |
|
|
113 | (1) |
|
7.3.3 Data Sensing and Acquisition Layer Attacks (DSAL) |
|
|
113 | (1) |
|
|
113 | (1) |
|
7.3.3.2 Traffic Monitoring |
|
|
114 | (1) |
|
7.3.3.3 Inefficient Logging |
|
|
114 | (1) |
|
7.3.4 Internet Layer Attacks (ILA) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
7.3.4.3 Alteration and Spoofing |
|
|
115 | (1) |
|
7.3.5 Service Layer Attacks (SLA) |
|
|
115 | (1) |
|
7.3.5.1 Account Hijacking |
|
|
115 | (1) |
|
|
115 | (1) |
|
7.3.5.3 Malicious VM Creation |
|
|
116 | (1) |
|
7.3.6 Data Abstraction Layer Attacks (DAIA) |
|
|
116 | (1) |
|
7.3.6.1 Malicious node Injection |
|
|
116 | (1) |
|
|
116 | (1) |
|
7.3.6.3 Malicious Insider |
|
|
117 | (1) |
|
7.3.7 Interface Layer Attacks (ILA) |
|
|
117 | (1) |
|
7.3.7.1 Reverse Engineering |
|
|
117 | (1) |
|
7.3.7.2 Reprogramming Attack |
|
|
118 | (1) |
|
|
118 | (1) |
|
7.4 Proposed IoT Security Framework |
|
|
118 | (4) |
|
|
119 | (1) |
|
7.4.2 Wireless Sensor Network Layer |
|
|
120 | (1) |
|
7.4.3 Data Sensing and acquisition layer |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
7.4.6 Data Abstraction Layer |
|
|
121 | (1) |
|
|
121 | (1) |
|
7.5 Case Study: Implementation of Denial of Service Attack in Home Automation |
|
|
122 | (4) |
|
7.5.1 A brief description of attack |
|
|
122 | (1) |
|
7.5.2 Experimental Test-bed Details |
|
|
123 | (1) |
|
|
123 | (3) |
|
7.6 Research and Challenges |
|
|
126 | (1) |
|
|
127 | (2) |
|
III Engineering and Applications for IoT Cloud Network |
|
|
129 | (94) |
|
8 A Novel Framework of Smart Cities Using Internet of Things (IoT): Opportunities and Challenges |
|
|
131 | (20) |
|
|
|
|
|
132 | (5) |
|
8.1.1 IoT infrastructure for smart city |
|
|
134 | (1) |
|
8.1.1.1 Network centric IoT |
|
|
134 | (1) |
|
8.1.1.2 Cloud centric IoT |
|
|
135 | (1) |
|
|
135 | (1) |
|
8.1.1.4 Human Centric IoT |
|
|
136 | (1) |
|
|
137 | (2) |
|
8.2.1 Associated communication technology for realizing smart cities |
|
|
139 | (1) |
|
|
139 | (8) |
|
|
141 | (1) |
|
8.3.2 Data Abstraction layer |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
8.3.5 Cloud computing layer |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
8.4.1 Smart traffic management |
|
|
147 | (1) |
|
|
147 | (1) |
|
8.5 Open Challenges and opportunities |
|
|
148 | (2) |
|
|
150 | (1) |
|
9 Interoperability and Information-Sharing Paradigm for IoT-Enabled Healthcare |
|
|
151 | (24) |
|
|
|
|
|
|
153 | (1) |
|
9.2 Mobile Health and the Internet of Medical Things |
|
|
154 | (1) |
|
9.3 Enabling Precision & Personalized Medicine |
|
|
155 | (1) |
|
9.4 Health Data Ownership in IoT and the Cloud |
|
|
156 | (8) |
|
9.4.1 IoT Data Ownership Challenges |
|
|
157 | (1) |
|
9.4.1.1 Consent for Data Capture |
|
|
157 | (1) |
|
9.4.1.2 Verifying Data Ownership: Local Identity Management and Authentication |
|
|
158 | (2) |
|
9.4.2 Healthcare Data Ownership |
|
|
160 | (1) |
|
9.4.2.1 Electronic Health Record (EHR) |
|
|
161 | (1) |
|
9.4.2.2 Personal Health Record |
|
|
161 | (1) |
|
9.4.2.3 Bridging Medical Data Ownership: Combining EHR and PHR |
|
|
162 | (2) |
|
9.5 Enabling IoMT Information Sharing in Healthcare |
|
|
164 | (6) |
|
9.5.1 Collecting Data from IoMT Devices |
|
|
164 | (1) |
|
9.5.2 Traditional Health Record Information Exchange for Information Federation |
|
|
165 | (1) |
|
9.5.2.1 Regulating Provider Access to PHR Data |
|
|
165 | (1) |
|
9.5.2.2 Providing Emergency Data Access |
|
|
165 | (2) |
|
9.5.3 Ensuring Data Integrity from IoMT Sensors |
|
|
167 | (1) |
|
9.5.4 Privately Replicating and Sharing Large Datasets |
|
|
167 | (1) |
|
9.5.5 Maintaining Consensus in Large-Scale Federated Systems |
|
|
168 | (1) |
|
9.5.6 Providing Emergency Access to Real-Time IoMT Data |
|
|
169 | (1) |
|
9.6 Achieving Heterogeneous Data Interoperability |
|
|
170 | (3) |
|
9.6.1 Interoperability Architecture Overview |
|
|
170 | (1) |
|
9.6.2 Current Interoperability Standards |
|
|
171 | (1) |
|
9.6.3 Future Standards and Alternative Methods |
|
|
172 | (1) |
|
9.7 Challenges & Opportunities |
|
|
173 | (2) |
|
10 Cloud Computing Based Intelligent Healthcare System |
|
|
175 | (12) |
|
|
|
176 | (1) |
|
10.2 Building an intelligent healthcare system |
|
|
177 | (1) |
|
10.3 Early detection and prediction of brain tumor using Intelligent Cloud |
|
|
178 | (2) |
|
10.3.1 Classification using different models |
|
|
179 | (1) |
|
|
179 | (1) |
|
10.4 Experiments and Results |
|
|
180 | (5) |
|
10.4.1 Naive Bayes Classifier Model |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (2) |
|
10.4.4 Summary and Discussion |
|
|
185 | (1) |
|
10.5 Research Challenges and possible solutions |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
11 IoT Cloud Network for Healthcare |
|
|
187 | (36) |
|
|
|
|
11.1 Introduction to modern health computing |
|
|
189 | (2) |
|
11.2 Overcoming the challenges |
|
|
191 | (2) |
|
11.2.1 Security and privacy of patient data |
|
|
191 | (1) |
|
11.2.2 Lack of uniformity among connected mobile devices |
|
|
191 | (1) |
|
11.2.3 Vulnerable data transmissions |
|
|
192 | (1) |
|
|
192 | (1) |
|
11.2.5 Awareness about IoTs |
|
|
192 | (1) |
|
11.2.6 Paralysis of Data Analysis |
|
|
192 | (1) |
|
11.3 Cloud computing over the intelligent healthcare system |
|
|
193 | (1) |
|
11.4 IoT and smart health system paradigms |
|
|
194 | (9) |
|
11.4.1 History of IoT in healthcare |
|
|
194 | (1) |
|
11.4.2 Role of IoT in Healthcare |
|
|
194 | (1) |
|
11.4.3 Challenges of IoT in healthcare |
|
|
195 | (1) |
|
11.4.4 Future of IoT in healthcare |
|
|
196 | (1) |
|
11.4.5 Patient-centered care |
|
|
196 | (2) |
|
11.4.6 Teleconsultation and Remote Patient monitoring |
|
|
198 | (1) |
|
|
199 | (1) |
|
11.4.8 Insideable devices |
|
|
199 | (1) |
|
|
200 | (1) |
|
11.4.10 Electronic Medical Records (EMR) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
11.4.13 The human genome project |
|
|
201 | (1) |
|
11.4.14 Personalized and precision medicine |
|
|
201 | (1) |
|
|
202 | (1) |
|
11.4.16 Artificial intelligence in healthcare |
|
|
202 | (1) |
|
11.5 New Design and Performance of IoT cloud for Smart Healthcare and Monitor system |
|
|
203 | (20) |
|
11.5.1 Disruptions in Internet |
|
|
205 | (1) |
|
11.5.2 Diversity of Protocols |
|
|
205 | (1) |
|
11.5.3 No Special Testing Tools Were Made for Healthcare Applications |
|
|
206 | (1) |
|
11.5.4 Difficulties in Performing Healthcare IoT Performance Testing |
|
|
206 | (1) |
|
11.5.5 Mobile technology in revolution of Smart Healthcare |
|
|
207 | (1) |
|
11.5.6 Financial challenges |
|
|
207 | (1) |
|
11.5.7 SaaS helps improve delivery of Hospital services |
|
|
208 | (1) |
|
11.5.8 The benefits of cloud computing |
|
|
209 | (1) |
|
11.5.9 Cloud security and regulatory compliance |
|
|
210 | (1) |
|
11.5.10 Spend less money, serve more patients |
|
|
210 | (1) |
|
11.5.11 mHealth in action |
|
|
211 | (1) |
|
|
211 | (2) |
|
11.5.11.2 Amazon Web Services IoT |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
11.5.11.5 Azure IoT Suite |
|
|
215 | (2) |
|
|
217 | (1) |
|
11.5.12 Compliance and Regulations |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
11.5.13 What We See in Future |
|
|
219 | (1) |
|
11.5.13.1 Healthcare Robots |
|
|
219 | (1) |
|
11.5.13.2 The Brain-Computer Interface |
|
|
220 | (3) |
Bibliography |
|
223 | (34) |
Index |
|
257 | |