Secure and smart Internet of Things (IoT) :: using blockchain and AI /
By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisio...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Denmark :
River Publishers,
[2018]
|
Schriftenreihe: | River Publishers series in information science and technology.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: * Internet of Things (IoT) * Industrial Internet of Things (IIoT) * Fog Computing * Artificial Intelligence * Blockchain Technology * Network Security * Zero-Trust Model * Data Analytics * Digital Transformation * DDoS * Smart Devices * Cybersecurity |
Beschreibung: | Includes index. 12.6 The Optimum Secure IoT Model |
Beschreibung: | 1 online resource |
ISBN: | 9788770220293 8770220298 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1078997488 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181215s2018 dk o 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d N$T |d MERUC |d ORZ |d YDXIT |d OCLCF |d YDX |d AJB |d UKAHL |d OCLCQ |d ESU |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d SFB |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1078947200 | ||
020 | |a 9788770220293 |q (electronic book) | ||
020 | |a 8770220298 |q (electronic book) | ||
035 | |a (OCoLC)1078997488 |z (OCoLC)1078947200 | ||
050 | 4 | |a TK5105.8857 |b .B36 2018 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.678 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Banafa, Ahmed, |e author. | |
245 | 1 | 0 | |a Secure and smart Internet of Things (IoT) : |b using blockchain and AI / |c Ahmed Banafa. |
264 | 1 | |a Denmark : |b River Publishers, |c [2018] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers series in information science and technology | |
505 | 0 | |a Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1) | |
505 | 8 | |a 2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology | |
505 | 8 | |a 5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges | |
505 | 8 | |a 8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word | |
505 | 8 | |a Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT | |
500 | |a Includes index. | ||
500 | |a 12.6 The Optimum Secure IoT Model | ||
588 | 0 | |a Online resource; title from digital title page (viewed on February 05, 2019). | |
520 | |a By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: * Internet of Things (IoT) * Industrial Internet of Things (IIoT) * Fog Computing * Artificial Intelligence * Blockchain Technology * Network Security * Zero-Trust Model * Data Analytics * Digital Transformation * DDoS * Smart Devices * Cybersecurity | ||
650 | 0 | |a Internet of things. |0 http://id.loc.gov/authorities/subjects/sh2013000266 | |
650 | 0 | |a Blockchains (Databases) |0 http://id.loc.gov/authorities/subjects/sh2016002790 | |
650 | 0 | |a Artificial intelligence. |0 http://id.loc.gov/authorities/subjects/sh85008180 | |
650 | 6 | |a Internet des objets. | |
650 | 6 | |a Chaînes de blocs. | |
650 | 6 | |a Intelligence artificielle. | |
650 | 7 | |a artificial intelligence. |2 aat | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Artificial intelligence |2 fast | |
650 | 7 | |a Blockchains (Databases) |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
758 | |i has work: |a Secure and smart Internet of Things (IoT) (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYvH93k9WTy8MrDD7mD7Pj |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Banafa, Ahmed. |t Secure and Smart Internet of Things (IoT) : Using Blockchain and AI. |d Aalborg : River Publishers, ©2018 |
830 | 0 | |a River Publishers series in information science and technology. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982636 |3 Volltext |
938 | |a YBP Library Services |b YANK |n 19574699 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH40652005 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH35793300 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5611047 | ||
938 | |a EBSCOhost |b EBSC |n 1982636 | ||
938 | |a YBP Library Services |b YANK |n 15890387 | ||
938 | |a YBP Library Services |b YANK |n 18126520 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1078997488 |
---|---|
_version_ | 1816882479835906048 |
adam_text | |
any_adam_object | |
author | Banafa, Ahmed |
author_facet | Banafa, Ahmed |
author_role | aut |
author_sort | Banafa, Ahmed |
author_variant | a b ab |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8857 .B36 2018 |
callnumber-search | TK5105.8857 .B36 2018 |
callnumber-sort | TK 45105.8857 B36 42018 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1) 2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology 5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges 8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT |
ctrlnum | (OCoLC)1078997488 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07985cam a2200829 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1078997488</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">181215s2018 dk o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">MERUC</subfield><subfield code="d">ORZ</subfield><subfield code="d">YDXIT</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">AJB</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ESU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1078947200</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770220293</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770220298</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1078997488</subfield><subfield code="z">(OCoLC)1078947200</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8857</subfield><subfield code="b">.B36 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Banafa, Ahmed,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure and smart Internet of Things (IoT) :</subfield><subfield code="b">using blockchain and AI /</subfield><subfield code="c">Ahmed Banafa.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Denmark :</subfield><subfield code="b">River Publishers,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">River Publishers series in information science and technology</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">12.6 The Optimum Secure IoT Model</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on February 05, 2019).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: * Internet of Things (IoT) * Industrial Internet of Things (IIoT) * Fog Computing * Artificial Intelligence * Blockchain Technology * Network Security * Zero-Trust Model * Data Analytics * Digital Transformation * DDoS * Smart Devices * Cybersecurity</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000266</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016002790</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85008180</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet des objets.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chaînes de blocs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Intelligence artificielle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">artificial intelligence.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Artificial intelligence</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Blockchains (Databases)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Secure and smart Internet of Things (IoT) (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYvH93k9WTy8MrDD7mD7Pj</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Banafa, Ahmed.</subfield><subfield code="t">Secure and Smart Internet of Things (IoT) : Using Blockchain and AI.</subfield><subfield code="d">Aalborg : River Publishers, ©2018</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">River Publishers series in information science and technology.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982636</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">19574699</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH40652005</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH35793300</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5611047</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1982636</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15890387</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">18126520</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1078997488 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:16Z |
institution | BVB |
isbn | 9788770220293 8770220298 |
language | English |
oclc_num | 1078997488 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | River Publishers, |
record_format | marc |
series | River Publishers series in information science and technology. |
series2 | River Publishers series in information science and technology |
spelling | Banafa, Ahmed, author. Secure and smart Internet of Things (IoT) : using blockchain and AI / Ahmed Banafa. Denmark : River Publishers, [2018] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier River Publishers series in information science and technology Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1) 2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology 5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges 8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT Includes index. 12.6 The Optimum Secure IoT Model Online resource; title from digital title page (viewed on February 05, 2019). By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: * Internet of Things (IoT) * Industrial Internet of Things (IIoT) * Fog Computing * Artificial Intelligence * Blockchain Technology * Network Security * Zero-Trust Model * Data Analytics * Digital Transformation * DDoS * Smart Devices * Cybersecurity Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Internet des objets. Chaînes de blocs. Intelligence artificielle. artificial intelligence. aat COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Artificial intelligence fast Blockchains (Databases) fast Internet of things fast has work: Secure and smart Internet of Things (IoT) (Text) https://id.oclc.org/worldcat/entity/E39PCYvH93k9WTy8MrDD7mD7Pj https://id.oclc.org/worldcat/ontology/hasWork Print version: Banafa, Ahmed. Secure and Smart Internet of Things (IoT) : Using Blockchain and AI. Aalborg : River Publishers, ©2018 River Publishers series in information science and technology. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982636 Volltext |
spellingShingle | Banafa, Ahmed Secure and smart Internet of Things (IoT) : using blockchain and AI / River Publishers series in information science and technology. Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1) 2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology 5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges 8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Internet des objets. Chaînes de blocs. Intelligence artificielle. artificial intelligence. aat COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Artificial intelligence fast Blockchains (Databases) fast Internet of things fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000266 http://id.loc.gov/authorities/subjects/sh2016002790 http://id.loc.gov/authorities/subjects/sh85008180 |
title | Secure and smart Internet of Things (IoT) : using blockchain and AI / |
title_auth | Secure and smart Internet of Things (IoT) : using blockchain and AI / |
title_exact_search | Secure and smart Internet of Things (IoT) : using blockchain and AI / |
title_full | Secure and smart Internet of Things (IoT) : using blockchain and AI / Ahmed Banafa. |
title_fullStr | Secure and smart Internet of Things (IoT) : using blockchain and AI / Ahmed Banafa. |
title_full_unstemmed | Secure and smart Internet of Things (IoT) : using blockchain and AI / Ahmed Banafa. |
title_short | Secure and smart Internet of Things (IoT) : |
title_sort | secure and smart internet of things iot using blockchain and ai |
title_sub | using blockchain and AI / |
topic | Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Artificial intelligence. http://id.loc.gov/authorities/subjects/sh85008180 Internet des objets. Chaînes de blocs. Intelligence artificielle. artificial intelligence. aat COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Artificial intelligence fast Blockchains (Databases) fast Internet of things fast |
topic_facet | Internet of things. Blockchains (Databases) Artificial intelligence. Internet des objets. Chaînes de blocs. Intelligence artificielle. artificial intelligence. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Artificial intelligence Internet of things |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982636 |
work_keys_str_mv | AT banafaahmed secureandsmartinternetofthingsiotusingblockchainandai |