Blockchain Applications for Secure IoT Frameworks:
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sharjah :
Bentham Science Publishers,
2021.
|
Schriftenreihe: | Advances in Computing Communications and Informatics Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Description based upon print version of record. 4.2. IoT Reference Architecture. |
Beschreibung: | 1 online resource (296 p.). |
ISBN: | 1681088622 9781681088624 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1263872123 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210814s2021 xx o ||| 0 eng d | ||
040 | |a EBLCP |b eng |c EBLCP |d N$T |d OCLCF |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 1681088622 | ||
020 | |a 9781681088624 |q (electronic bk.) | ||
035 | |a (OCoLC)1263872123 | ||
050 | 4 | |a TK5105.8857 | |
082 | 7 | |a 004.678 |2 23/eng/20220830 | |
049 | |a MAIN | ||
100 | 1 | |a Sharma, Sudhir K. | |
245 | 1 | 0 | |a Blockchain Applications for Secure IoT Frameworks |h [electronic resource]. |
260 | |a Sharjah : |b Bentham Science Publishers, |c 2021. | ||
300 | |a 1 online resource (296 p.). | ||
490 | 1 | |a Advances in Computing Communications and Informatics Ser. | |
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits | |
505 | 8 | |a 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack | |
505 | 8 | |a 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security | |
505 | 8 | |a 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges | |
505 | 8 | |a Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture | |
500 | |a 4.2. IoT Reference Architecture. | ||
650 | 0 | |a Internet of things. |0 http://id.loc.gov/authorities/subjects/sh2013000266 | |
650 | 0 | |a Blockchains (Databases) |0 http://id.loc.gov/authorities/subjects/sh2016002790 | |
650 | 6 | |a Internet des objets. | |
650 | 6 | |a Chaînes de blocs. | |
650 | 7 | |a Blockchains (Databases) |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
700 | 1 | |a Bhushan, Bharat. | |
700 | 1 | |a Astya, Parma N. | |
758 | |i has work: |a Blockchain Applications for Secure IoT Frameworks (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3QtdBGVGwhRWwMJwJ8hBP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Sharma, Sudhir K. |t Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future |d Sharjah : Bentham Science Publishers,c2021 |z 9781681088631 |
830 | 0 | |a Advances in Computing Communications and Informatics Ser. | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 |3 Volltext | |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6695807 | ||
938 | |a EBSCOhost |b EBSC |n 2966423 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1263872123 |
---|---|
_version_ | 1813901704837464064 |
adam_text | |
any_adam_object | |
author | Sharma, Sudhir K. |
author2 | Bhushan, Bharat Astya, Parma N. |
author2_role | |
author2_variant | b b bb p n a pn pna |
author_facet | Sharma, Sudhir K. Bhushan, Bharat Astya, Parma N. |
author_role | |
author_sort | Sharma, Sudhir K. |
author_variant | s k s sk sks |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8857 |
callnumber-search | TK5105.8857 |
callnumber-sort | TK 45105.8857 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture |
ctrlnum | (OCoLC)1263872123 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04974cam a2200505Mu 4500</leader><controlfield tag="001">ZDB-4-EBA-on1263872123</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">210814s2021 xx o ||| 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="c">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1681088622</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781681088624</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1263872123</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8857</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">23/eng/20220830</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharma, Sudhir K.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Blockchain Applications for Secure IoT Frameworks</subfield><subfield code="h">[electronic resource].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Sharjah :</subfield><subfield code="b">Bentham Science Publishers,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (296 p.).</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Computing Communications and Informatics Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">4.2. IoT Reference Architecture.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000266</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016002790</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet des objets.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chaînes de blocs.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Blockchains (Databases)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhushan, Bharat.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Astya, Parma N.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Blockchain Applications for Secure IoT Frameworks (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3QtdBGVGwhRWwMJwJ8hBP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Sharma, Sudhir K.</subfield><subfield code="t">Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future</subfield><subfield code="d">Sharjah : Bentham Science Publishers,c2021</subfield><subfield code="z">9781681088631</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Computing Communications and Informatics Ser.</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6695807</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2966423</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1263872123 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T15:51:08Z |
institution | BVB |
isbn | 1681088622 9781681088624 |
language | English |
oclc_num | 1263872123 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (296 p.). |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Bentham Science Publishers, |
record_format | marc |
series | Advances in Computing Communications and Informatics Ser. |
series2 | Advances in Computing Communications and Informatics Ser. |
spelling | Sharma, Sudhir K. Blockchain Applications for Secure IoT Frameworks [electronic resource]. Sharjah : Bentham Science Publishers, 2021. 1 online resource (296 p.). Advances in Computing Communications and Informatics Ser. Description based upon print version of record. Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture 4.2. IoT Reference Architecture. Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Internet des objets. Chaînes de blocs. Blockchains (Databases) fast Internet of things fast Bhushan, Bharat. Astya, Parma N. has work: Blockchain Applications for Secure IoT Frameworks (Text) https://id.oclc.org/worldcat/entity/E39PD3QtdBGVGwhRWwMJwJ8hBP https://id.oclc.org/worldcat/ontology/hasWork Print version: Sharma, Sudhir K. Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future Sharjah : Bentham Science Publishers,c2021 9781681088631 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 Volltext |
spellingShingle | Sharma, Sudhir K. Blockchain Applications for Secure IoT Frameworks Advances in Computing Communications and Informatics Ser. Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Internet des objets. Chaînes de blocs. Blockchains (Databases) fast Internet of things fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000266 http://id.loc.gov/authorities/subjects/sh2016002790 |
title | Blockchain Applications for Secure IoT Frameworks |
title_auth | Blockchain Applications for Secure IoT Frameworks |
title_exact_search | Blockchain Applications for Secure IoT Frameworks |
title_full | Blockchain Applications for Secure IoT Frameworks [electronic resource]. |
title_fullStr | Blockchain Applications for Secure IoT Frameworks [electronic resource]. |
title_full_unstemmed | Blockchain Applications for Secure IoT Frameworks [electronic resource]. |
title_short | Blockchain Applications for Secure IoT Frameworks |
title_sort | blockchain applications for secure iot frameworks |
topic | Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Internet des objets. Chaînes de blocs. Blockchains (Databases) fast Internet of things fast |
topic_facet | Internet of things. Blockchains (Databases) Internet des objets. Chaînes de blocs. Internet of things |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 |
work_keys_str_mv | AT sharmasudhirk blockchainapplicationsforsecureiotframeworks AT bhushanbharat blockchainapplicationsforsecureiotframeworks AT astyaparman blockchainapplicationsforsecureiotframeworks |