Smart Network Inspired Paradigm and Approaches in IoT Applications -

Smart Network Inspired Paradigm and Approaches in IoT Applications (eBook)

eBook Download: PDF
2019 | 1st ed. 2019
IX, 253 Seiten
Springer Singapore (Verlag)
978-981-13-8614-5 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book gathers high-quality research articles and reviews that reflect the latest advances in the smart network-inspired paradigm and address current issues in IoT applications as well as other emerging areas.

Featuring work from both academic and industry researchers, the book provides a concise overview of the current state of the art and highlights some of the most promising and exciting new ideas and techniques. Accordingly, it offers a valuable resource for senior undergraduate and graduate students, researchers, policymakers, and IT professionals and providers working in areas that call for state-of-the-art networks and IoT applications.




Dr. Mohamed Elhoseny is currently an Assistant Professor at the Faculty of Computers and Information, Mansoura University, Egypt, where he is also Director of the Distributed Sensing and Intelligent Systems Lab. Dr. Elhoseny has authored or co-authored over 100 ISI journal articles, conference proceedings, book chapters, and several books published by Springer and Taylor& Francis. His research interests include Network Security, Cryptography, Machine Learning Techniques, and Intelligent Systems. Dr. Elhoseny serves as the Editor-in-Chief of the International Journal of Smart Sensor Technologies and Applications, and as an Associate Editor of several journals such as IEEE Access.

AMIT KUMAR SINGH received the bachelor's degree and M.Tech. in computer science and engineering from Veer Bahadur Singh Purvanchal University, Jaunpur, India (2005) and Jaypee University of Information Technology, Waknaghat, India (2010), prior to completing his Ph.D. degree in computer engineering at the National Institute of Technology, Kurukshetra, India (2015). He worked at the Computer Science and Engineering Department, Jaypee University of Information Technology, from 2008 to 2018. He is currently an Assistant Professor at the Computer Science and Engineering Department, National Institute of Technology at Patna (An Institute of National Importance), Patna, India. Dr. Singh has authored over 80 peer-reviewed journal articles, conference publications, and book chapters, as well as the books Medical Image Watermarking: Techniques and Applications (2017), and Animal Biometrics: Techniques and Applications (2018, Springer International Publishing). He has also edited several books and currently serves on the Editorial Board of two peer-reviewed international journals. His research interests include Data Hiding, Biometrics, and Cryptography. 



This book gathers high-quality research articles and reviews that reflect the latest advances in the smart network-inspired paradigm and address current issues in IoT applications as well as other emerging areas. Featuring work from both academic and industry researchers, the book provides a concise overview of the current state of the art and highlights some of the most promising and exciting new ideas and techniques. Accordingly, it offers a valuable resource for senior undergraduate and graduate students, researchers, policymakers, and IT professionals and providers working in areas that call for state-of-the-art networks and IoT applications.

Preface 5
Special Acknowledgements 6
Contents 7
About the Editors 9
A Reactive Hybrid Metaheuristic Energy-Efficient Algorithm for Wireless Sensor Networks 10
1 Introduction 10
2 Network Model 13
2.1 Energy Model 13
2.2 Cluster Head (CH) Formation 13
3 Proposed RAP Algorithm 14
3.1 ACO Based Path Selection 14
3.2 PSO Algorithm 16
3.3 Reactive Data Transmission 17
4 Results and Discussion 18
5 Conclusion 20
References 20
Maintaining Consistent Firewalls and Flows (CFF) in Software-Defined Networks 23
1 Introduction 23
2 Related Work 24
3 CFF—Explained with an Example 25
4 Modification in Firewall Rule Table and Flow Table 28
5 Implementation 30
6 Conclusion 31
References 31
Energy-Efficient Broadcasting of Route-Request Packets (E2BR2) in Ad Hoc Networks 33
1 Introduction 33
2 Related Work 34
3 Why Broadcasting of RREQ Is Special? 36
4 Proposed Work E2BR2 36
4.1 Network Model 36
4.2 Broadcast Route Selection for RREQ Packets 38
5 Illustration with an Example 44
6 Simulation Results 46
7 Conclusion 51
References 52
Decision Support System for Smart Grid Using Demand Forecasting Models 54
1 Introduction 55
1.1 Smart Grid Components 56
1.2 Challenges in Smart Grid Implementation 58
2 Power Demand Forecasting 59
2.1 Types of Power Demand Forecasting 60
2.2 Challenges in Power Demand Forecasting 60
2.3 Difficulties in Demand Forecasting 62
3 Short-Term Power Demand Forecasting Methods and Model Results 63
3.1 Naive Forecast Method (Same Day/Similar Day Approach) 64
3.2 Exponential Smoothing Method 64
3.3 Autoregressive Moving Average (ARMA) Method 65
3.4 Hybrid ARMA (p q) Model 66
4 Conclusion 67
References 68
Internet of Things—The Concept, Inherent Security Challenges and Recommended Solutions 70
1 Introduction 70
2 Security-Based Research Evolution in IoT 73
3 Prominent Vulnerabilities in IoT 78
4 Critical Security Issues in IoT 80
4.1 Secure Communication Issue Between WSN and IoT 80
4.2 Authentication Issue in the Internet of Things 82
4.3 Key Management Issue in the Internet of Things 83
5 Recommended Solutions 84
5.1 Secure Transmission Between Sensor and IoT 84
5.2 Robust Authentication in IoT 86
5.3 Enhancing Key Management in IoT 87
6 Conclusion 88
References 88
Critical Challenges in Access Management Schemes for Smartphones: An Appraisal 94
1 Introduction 94
2 Background Work 96
2.1 Biometric-Based Access Management 96
2.2 Non-biometric-Based Access Management 111
3 Research Challenges and Open Issues 115
4 Conclusion 116
References 116
Using Fuzzy Neural Networks Regularized to Support Software for Predicting Autism in Adolescents on Mobile Devices 121
1 Introduction 122
2 Literature Review 123
2.1 Autistic Spectrum Disorder 123
2.2 Expert Systems for the Diagnosis of Autism 123
2.3 Techniques of Artificial Neural Networks and Fuzzy Systems 125
2.4 Fuzzy Neural Network 126
2.5 A Mobile System for Autism Identification—Autism Spectrum Disorder Tests App 126
2.6 Self-Organized Direction-Aware Data Partitioning Algorithm—SODA 126
2.7 Robust Activation Function—RAF 128
3 Fuzzy Neural Network for Autism Spectrum Disorder Test 129
3.1 Network Architecture 130
3.2 Training Fuzzy Neural Network 132
4 Test of Classification Binary Patterns 135
4.1 Assumptions and Initial Test Configurations 135
4.2 Database Used in the Tests 136
4.3 Autism Pattern Classification 137
4.4 Interpretability of the Problem Based on Fuzzy Rules 137
5 Conclusion 137
References 139
Performance Evaluation of Supervised Machine Learning Classifiers for Analyzing Agricultural Big Data 140
1 Introduction 140
2 Classification Overview 141
2.1 Supervised Methods 141
3 Comparative Study 146
4 Literature Review 148
5 Dataset Construction 149
6 Performance Evaluation 150
7 Conclusion 154
References 154
WordNet Ontology-Based Web Page Personalization Using Weighted Clustering and OFFO Algorithm 156
1 Introduction 156
2 Existing Literature—A Survey 158
3 Importance of Web Page Personalization 158
4 Methodology 159
4.1 Data Collection 160
4.2 Clustering the Data Using WC Algorithm 160
4.3 Learning Module 161
4.4 WordNet 161
4.5 Similarity Measures 161
4.6 Web Page Personalization Using OFFO Algorithm 163
4.7 Personalization of Maximum Similarity Data 165
5 Result and Discussion 166
5.1 Database Description 166
5.2 Performance Measures 166
6 Conclusion 170
References 170
Mobility Condition to Study Performance of MANET Routing Protocols 173
1 Introduction 173
2 Mobility Models Overview 175
3 Used Mobility Metric 175
3.1 Mobility Metrics Overview 175
3.2 Used Mobility Metric 177
4 Simulation and Results 178
4.1 Simulation Environment 179
4.2 Performance Metrics 179
4.3 Results and Discussion 180
5 Conclusion 180
References 181
Security Requirements and Model for Mobile Agent Authentication 182
1 Introduction 182
2 Mobile Agents Security Overview 183
3 SSL/TLS Discussion 184
3.1 Secure Sockets Layer Protocol 184
3.2 Description of the Protocol 184
3.3 Motivation 186
4 Related Works 186
5 Proposed Approach 187
5.1 Description of the Approach 187
6 Experimentation: Implementation on Jade 188
6.1 Architectural Overview 188
6.2 Simulation 190
7 Conclusion 191
References 192
Internet of Thing for Smart Home System Using Web Services and Android Application 193
1 Introduction 193
2 Related Work 194
3 The Proposed Architecture for Smart Home/Smartphone System 195
3.1 System Architecture 195
3.2 Technologies for the Smart Home Implementation 196
4 Scenarios of Implementation of Smart Home System Using RESTfull and Arduino UNO WI-FI 201
5 Conclusion 202
References 203
Bat with Teaching and Learning Based Optimization Algorithm for Node Localization in Mobile Wireless Sensor Networks 205
1 Introduction 205
2 Bat Algorithm 208
3 Proposed Node Localization Algorithm in MWSN 209
3.1 BAT-TLBO Algorithm 209
3.2 Proposed Node Localization Algorithm in MWSN 210
4 Performance Evaluation 212
4.1 Parameters Setup 212
4.2 Results and Discussion 213
5 Conclusion 220
References 221
A Next Generation Hybrid Scheme Mobile Graphical Authenticator 223
1 Introduction 224
1.1 Cognitive Biometrics 224
1.2 Recognition-Based Techniques 225
1.3 Recall-Based Techniques 226
1.4 Hybrid Scheme 226
2 The Coin Passcode Graphical Password Authentication Model 227
2.1 The Coin Passcode Structure 227
2.2 The Coin Passcode Keypad Randomization 228
2.3 The Coin Passcode Registration 229
2.4 The Coin Passcode Authentication Algorithm 230
3 Security Analysis and Usability Metrics 230
3.1 Password Complexity Comparison 231
3.2 Shoulder Surfing Attack and Spyware Attack 233
3.3 Login Time 234
3.4 Password Guessing and Dictionary Attack 235
4 Discussions 236
5 Conclusion 236
References 237
Energy Efficient MANET by Trusted Node Identification Using IHSO Optimization 240
1 Introduction 240
2 Literature Review 242
3 Importance of Routing Mechanism in MANET 243
4 Methodology 243
4.1 Routing Protocol Used in the Proposed Model 243
4.2 Cluster Formation Using VLWBC Algorithm 244
4.3 Trusted Node Based Routing 246
4.4 Objective of the Proposed Model 246
4.5 Trusted Node 248
5 Result Analysis 249
5.1 Performance Measures 249
6 Conclusion 252
References 253

Erscheint lt. Verlag 20.7.2019
Zusatzinfo IX, 253 p. 110 illus., 95 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Office Programme Outlook
Informatik Software Entwicklung Mobile- / App-Entwicklung
Sozialwissenschaften Politik / Verwaltung Staat / Verwaltung
Schlagworte Cyber threat intelligence and defense • Internet of Things Applications • Network-based big data management • smart cities • Smart Network Approaches
ISBN-10 981-13-8614-5 / 9811386145
ISBN-13 978-981-13-8614-5 / 9789811386145
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich