Blockchain Applications for Secure IoT Frameworks.
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Sharjah :
Bentham Science Publishers,
2021.
|
Series: | Advances in Computing Communications and Informatics Ser.
|
Subjects: | |
Online Access: | CONNECT CONNECT |
LEADER | 05154cam a2200541Mu 4500 | ||
---|---|---|---|
001 | in00006199533 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210814s2021 xx o ||| 0 eng d | ||
005 | 20221003144734.1 | ||
035 | |a 1WRLDSHRon1263872123 | ||
040 | |a EBLCP |b eng |c EBLCP |d N$T |d OCLCF | ||
020 | |a 1681088622 | ||
020 | |a 9781681088624 |q (electronic bk.) | ||
035 | |a (OCoLC)1263872123 | ||
050 | 4 | |a TK5105.8857 | |
082 | 0 | 4 | |a 004.678 |2 23/eng/20220830 |
049 | |a TXMM | ||
100 | 1 | |a Sharma, Sudhir K. | |
245 | 1 | 0 | |a Blockchain Applications for Secure IoT Frameworks. |
260 | |a Sharjah : |b Bentham Science Publishers, |c 2021. | ||
300 | |a 1 online resource (296 p.). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Computing Communications and Informatics Ser. | |
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits | |
505 | 8 | |a 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack | |
505 | 8 | |a 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security | |
505 | 8 | |a 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges | |
505 | 8 | |a Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture | |
500 | |a 4.2. IoT Reference Architecture. | ||
590 | 0 | |a EBSCO eBook Academic Comprehensive Collection North America | |
650 | 0 | |a Internet of things. | |
650 | 0 | |a Blockchains (Databases) | |
700 | 1 | |a Bhushan, Bharat. | |
700 | 1 | |a Astya, Parma N. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |a Sharma, Sudhir K. |t Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future |d Sharjah : Bentham Science Publishers,c2021 |z 9781681088631 |
830 | 0 | |a Advances in Computing Communications and Informatics Ser. | |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 |z CONNECT |3 eBooks on EBSCOhost |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s fb364667-2ff0-407f-8656-a8cf90e0b3dc |i d52e6abc-c711-429f-a9cf-40c629bda4de |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 1 |e TK5105.8857 |h Library of Congress classification |
856 | 4 | 0 | |3 eBooks on EBSCOhost |t 0 |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423 |z CONNECT |