Integration of WSNs into Internet of Things

Integration of WSNs into Internet of Things

A Security Perspective

Khamparia, Aditya; Sharma, Sudhir Kumar; Debnath, Narayan C.; Kumar, Raghvendra; Bhushan, Bharat

Taylor & Francis Ltd

06/2021

352

Dura

Inglês

9780367620196

15 a 20 dias

648

Descrição não disponível.
Chapter 1 Security Issues, Vulnerabilities and Defense Mechanisms in Wireless Sensor Network: State of the Art and Recommendation

Chapter 2. Security Attacks and Countermeasures in Wireless Sensor Network

Chapter 3. Overview of Ubiquitous Computing and a Modern Look in Current Times

Chapter 4. Cryptanalysis and Security Evaluation Using Artificial Neural Networks)

Chapter 5. Post-Quantum Cryptography on Wireless Sensor Networks: Challenges and Opportunities

Chapter 6 Performance Evaluation Using Different Routing Protocols in MANETs

Chapter 7.Smart Agriculture Using Wireless Sensor Networks

Chapter 8. Big Data Analytics for WSNs and Smart Grids: Applications, Design Issues and Future Challenges

Chapter 9. A New Algorithm Proposed for the Disaggregation of Loads in the Smart Grid Context

Chapter 10. A Security Paradigm of WSN, IoT and CPS: Challenges and Solutions

Chapter 11. (IoT: Fundamentals and Challenges)

Chapter 12. Enabling Technologies, Attacks and Machine Learning based Countermeasures for IoT and IIoT

Chapter 13. Applications of AI and ML in IoT

Chapter 14. Ubiquities Computing for Management, Evaluation, Treatment and Rehabilitation of Psychological Disorders

Chapter 15. Challenges and Vulnerabilities of WSNs based IoT in Healthcare and Medical industry

Chapter 16. (Blockchain Technology for Healthcare Cloud-Based Data Privacy and Security)
WSN;ML;Sensor Nodes;Machine Learning;IoT Device;IoT;IoT System;Wireless Sensor Network;Malicious Nodes;Blockchain;Ubiquitous Computing;Routing Protocols;IoT Network;Academic institutions;Quantum Computing;Wireless sensor networks;Blackhole Attacks;Internet of Things;Selective Forwarding Attacks;University libraries;Energy Consumption Test;Communication Protocols;IoT Architecture;Unsupervised Ml;Data Encryption Standard;Ml Technique;Ml Algorithm;IoT Security;Sensor Networks;Wormhole Attack;Cryptographic Algorithms;Data Link Layer;Smart Agriculture;Cps