Blockchain Applications for Secure IoT Frameworks.

Saved in:
Bibliographic Details
Main Author: Sharma, Sudhir K.
Other Authors: Bhushan, Bharat., Astya, Parma N.
Format: eBook
Language:English
Published: Sharjah : Bentham Science Publishers, 2021.
Series:Advances in Computing Communications and Informatics Ser.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 05154cam a2200541Mu 4500
001 in00006199533
006 m o d
007 cr cnu---unuuu
008 210814s2021 xx o ||| 0 eng d
005 20221003144734.1
035 |a 1WRLDSHRon1263872123 
040 |a EBLCP  |b eng  |c EBLCP  |d N$T  |d OCLCF 
020 |a 1681088622 
020 |a 9781681088624  |q (electronic bk.) 
035 |a (OCoLC)1263872123 
050 4 |a TK5105.8857 
082 0 4 |a 004.678  |2 23/eng/20220830 
049 |a TXMM 
100 1 |a Sharma, Sudhir K. 
245 1 0 |a Blockchain Applications for Secure IoT Frameworks. 
260 |a Sharjah :  |b Bentham Science Publishers,  |c 2021. 
300 |a 1 online resource (296 p.). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Computing Communications and Informatics Ser. 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- An Overview of Smart Grid in the Current Age -- Reinaldo Padilha França1,*, Ana Carolina Borges Monteiro1,*, Rangel Arthur2 and Yuzo Iano1 -- 1. INTRODUCTION -- 2. SMART CITIES CONCEPTS -- 3. SMART GRID CONCEPTS -- 3.1. Smart Grid and IoT -- 3.2. Smart Grid Applications -- 3.3. Smart Grid Advantages -- 4. SMART GRID INFRASTRUCTURE -- 5. DISCUSSION -- 5.1. Infrastructure generated by Smart Grid -- 5.2. Smart Grid as an Instrument of Innovation -- 5.3. Smart Grid Benefits 
505 8 |a 5.4. Blockchain for Smart Grids -- CONCLUSION -- TRENDS -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- Dynamic Strategies of Machine Learning for Extenuation of Security Breaches in Wireless Sensor Networks -- Shweta Paliwal1,* -- 1. INTRODUCTION -- 2. SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS -- 2.1. Eavesdropping Attack -- 2.2. Jamming Attack -- 2.3. Tampering -- 2.4. Exhaustion and Collision Attack -- 2.5. Sybil Attack -- 2.6. Blackhole Attack -- 2.7. Wormhole Attack -- 2.8. Grayhole Attack -- 2.9. Sinkhole Attack -- 2.10. Hello Flood Attack 
505 8 |a 3. MACHINE LEARNING EMERGING AS A SAFEGUARD TO WSNS -- 4. SUPERVISED LEARNING -- 4.1. Linear Regression and Logistic Regression -- 4.2. Artificial Neural Networks (ANN) -- 4.3. Decision Tree -- 4.4. Random Forest -- 4.5. Bayesian Learning -- 4.6. Support Vector Machine (SVM) -- 4.7. K- Nearest Neighbor (K-NN) -- 5. UNSUPERVISED LEARNING -- 5.1. K- Means Clustering -- 5.2. Fuzzy C- Means Clustering -- 6. SEMI-SUPERVISED LEARNING -- 7. REINFORCEMENT LEARNING -- 8. MACHINE LEARNING ADDRESSING ISSUES IN WSNS -- 8.1. Machine Learning Addressing Issue of Security 
505 8 |a 8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network -- 8.3. Data Aggregation in WSNs with Machine Learning -- 9. PROPOSED FEATURE SELECTION METHOD AND COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS -- 9.1. Dataset Gathering -- 9.2. Feature Selection Methodology -- 9.2.1. Correlation-based Feature -- 9.2.2. Info Gain Method -- 9.2.3. CFS Subset Evaluation -- 10. EXPERIMENTAL RESULTS AND ANALYSIS -- CONCLUSION AND FUTURE WORK -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENT -- REFERENCES -- IoT- Fundamentals and Challenges 
505 8 |a Mohammad Maksuf Ul Haque1, Shazmeen Shamsi1, Khwaja M. Rafi2 and Mohammad Sufian Badar3,4,* -- 1. INTRODUCTION -- 2. HISTORY OF IOT -- 2.1. Realizing the Concept -- 3. INTERNET OF THINGS -- 3.1. Meaning of IoT -- 3.2. Importance of IoT -- 3.2.1. Things that Collect and Send Information -- 3.2.2. Things that Receive Information and then Act on it -- 3.2.3. Things that Can Do Both -- 3.3. Scope of IoT: Applications and Examples -- 3.3.1. Increasing Efficiency -- 3.3.2. Improved Health and Safety -- 3.3.3. Enhancing Experience -- 4. FUNDAMENTALS OF IOT -- 4.1. IoT Device Architecture 
500 |a 4.2. IoT Reference Architecture. 
590 0 |a EBSCO eBook Academic Comprehensive Collection North America 
650 0 |a Internet of things. 
650 0 |a Blockchains (Databases) 
700 1 |a Bhushan, Bharat. 
700 1 |a Astya, Parma N. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Sharma, Sudhir K.  |t Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future  |d Sharjah : Bentham Science Publishers,c2021  |z 9781681088631 
830 0 |a Advances in Computing Communications and Informatics Ser. 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423  |z CONNECT  |3 eBooks on EBSCOhost  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s fb364667-2ff0-407f-8656-a8cf90e0b3dc  |i d52e6abc-c711-429f-a9cf-40c629bda4de  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e TK5105.8857   |h Library of Congress classification 
856 4 0 |3 eBooks on EBSCOhost  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2966423  |z CONNECT