About the editors |
|
xi | |
Foreword and outline |
|
xiii | |
|
1 Access control approaches for smart cities |
|
|
1 | (40) |
|
Nuray Baltaci Akhuseyinoglu |
|
|
|
|
1 | (2) |
|
|
3 | (7) |
|
1.2.1 What is a smart city? |
|
|
3 | (1) |
|
1.2.2 Smart city applications |
|
|
4 | (1) |
|
1.2.3 Key enabling technologies for smart cities |
|
|
5 | (5) |
|
1.3 Security and privacy challenges |
|
|
10 | (4) |
|
1.3.1 Unique characteristics of smart city applications |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.3.3 Secure interoperation |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
1.4 AC approaches for smart cities |
|
|
14 | (20) |
|
|
14 | (3) |
|
1.4.2 AC models and frameworks for smart city and smart city applications |
|
|
17 | (4) |
|
1.4.3 AC models and frameworks for secure interoperation |
|
|
21 | (6) |
|
1.4.4 Trust-based AC models and frameworks |
|
|
27 | (4) |
|
1.4.5 AC models and frameworks for insider threats |
|
|
31 | (3) |
|
1.5 Future research directions and perspectives |
|
|
34 | (1) |
|
|
34 | (7) |
|
|
35 | (1) |
|
|
35 | (6) |
|
2 Impact of Internet of Things in smart cities |
|
|
41 | (22) |
|
|
|
41 | (1) |
|
|
42 | (1) |
|
2.3 IoT technologies for smart cities |
|
|
42 | (3) |
|
2.4 Smart city: IoT applications |
|
|
45 | (5) |
|
2.4.1 Smart infrastructure |
|
|
45 | (2) |
|
2.4.2 Smart building and properties |
|
|
47 | (1) |
|
2.4.3 Smart industrial environment |
|
|
48 | (1) |
|
2.4.4 Smart city services |
|
|
48 | (1) |
|
2.4.5 Smart energy management |
|
|
49 | (1) |
|
2.4.6 Smart water and weather management |
|
|
49 | (1) |
|
2.4.7 Smart waste management |
|
|
50 | (1) |
|
2.5 Applications: world wide |
|
|
50 | (4) |
|
2.5.1 International-use cases |
|
|
50 | (2) |
|
|
52 | (2) |
|
2.6 Challenges and future directions |
|
|
54 | (1) |
|
|
55 | (8) |
|
|
55 | (8) |
|
|
63 | (20) |
|
|
|
|
63 | (5) |
|
3.1.1 IoT in traditional city |
|
|
65 | (1) |
|
3.1.2 Myths about smart cities |
|
|
66 | (2) |
|
3.1.3 IoT for communication in smart cities |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
71 | (1) |
|
3.3.2 Leakage maintenance |
|
|
71 | (1) |
|
3.3.3 SW metering maintenance |
|
|
71 | (1) |
|
|
72 | (1) |
|
3.4 Proposed structure for SW |
|
|
72 | (2) |
|
|
74 | (4) |
|
3.5.1 IoT in asset maintenance and leakage detection |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
3.5.4 IoT in SW distribution network |
|
|
76 | (1) |
|
3.5.5 IoT in SW irrigation |
|
|
77 | (1) |
|
3.5.6 IoT in remote controlling of SW assets |
|
|
77 | (1) |
|
3.5.7 IoT for SW pricing or revenue generation |
|
|
77 | (1) |
|
3.5.8 IoT for smart billing for SW |
|
|
77 | (1) |
|
3.5.9 IoT for measuring deep water quality |
|
|
78 | (1) |
|
3.5.10 IoT for predicting water-based natural calamities |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (4) |
|
|
79 | (4) |
|
4 Contiki-OS IoT data analytics |
|
|
83 | (22) |
|
|
|
Hafiz Muhammad Raza ur Rehman |
|
|
|
|
|
|
84 | (1) |
|
|
85 | (3) |
|
4.3 Contiki-OS message structures |
|
|
88 | (2) |
|
4.4 Mathematical formulas for required statistics |
|
|
90 | (2) |
|
|
92 | (4) |
|
4.6 Results and discussion |
|
|
96 | (6) |
|
|
102 | (3) |
|
|
102 | (3) |
|
5 Analysis of the safety of the Internet of Things in the mesh |
|
|
105 | (26) |
|
|
|
105 | (2) |
|
|
107 | (2) |
|
|
107 | (1) |
|
5.2.2 Open Trust Protocol |
|
|
108 | (1) |
|
5.3 Safety aspects in the IEEE 802.15.4 standard |
|
|
109 | (2) |
|
5.4 Technical guidelines for securely transferring information between selected IoT mesh points |
|
|
111 | (3) |
|
|
111 | (2) |
|
5.4.2 Types of communication |
|
|
113 | (1) |
|
5.5 Security of the implementation of the mesh IoT |
|
|
114 | (9) |
|
5.5.1 Bluetooth mesh networking |
|
|
115 | (2) |
|
5.5.2 Disruption-tolerant mesh network |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (2) |
|
5.6 Comparison of security aspects in different networks |
|
|
123 | (1) |
|
|
124 | (7) |
|
|
124 | (7) |
|
6 Design of smart urban drainage systems using evolutionary decision tree model |
|
|
131 | (20) |
|
|
|
|
131 | (4) |
|
6.1.1 Overview of drainage systems design criteria |
|
|
133 | (2) |
|
6.1.2 Overview of machine learning application in drainage systems design |
|
|
135 | (1) |
|
6.2 Materials and methods |
|
|
135 | (9) |
|
|
135 | (1) |
|
|
136 | (1) |
|
6.2.3 Performance indices |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
140 | (1) |
|
6.2.7 Comparison of models |
|
|
141 | (2) |
|
6.2.8 IoT applications in drainage systems |
|
|
143 | (1) |
|
|
144 | (7) |
|
|
145 | (6) |
|
7 Statistical analysis for sensory E-Health applications: opportunities and challenges |
|
|
151 | (20) |
|
|
|
|
152 | (1) |
|
|
153 | (3) |
|
|
156 | (3) |
|
|
156 | (1) |
|
7.3.2 Data set and activities |
|
|
156 | (1) |
|
|
157 | (2) |
|
7.4 Opportunities and directions |
|
|
159 | (7) |
|
|
166 | (5) |
|
|
167 | (4) |
|
8 Cybersecurity attacks on medical IoT devices for smart city healthcare services |
|
|
171 | (18) |
|
|
|
|
|
|
|
171 | (1) |
|
8.2 Smart city healthcare |
|
|
172 | (3) |
|
|
172 | (1) |
|
8.2.2 Smart city healthcare systems |
|
|
173 | (2) |
|
8.2.3 Benefits arising from smart city healthcare |
|
|
175 | (1) |
|
8.3 IoT medical devices for smart city healthcare systems |
|
|
175 | (2) |
|
|
175 | (1) |
|
8.3.2 Medical IoT devices security objectives |
|
|
176 | (1) |
|
8.4 Cybersecurity attacks on medical IoT devices |
|
|
177 | (4) |
|
|
178 | (1) |
|
8.4.2 Post-compromise actions |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
8.5 Security countermeasures |
|
|
181 | (3) |
|
8.5.1 Ensuring confidentiality and integrity |
|
|
181 | (1) |
|
8.5.2 Ensuring availability |
|
|
182 | (1) |
|
8.5.3 Ensuring authentication and authorization |
|
|
183 | (1) |
|
8.5.4 Ensuring nonrepudiation |
|
|
183 | (1) |
|
8.6 Emerging good practice and approaches (standards) |
|
|
184 | (1) |
|
8.7 Conclusions and further challenges |
|
|
185 | (4) |
|
|
185 | (4) |
|
9 HaLow: registering thousands of low-power sensors in smart cities |
|
|
189 | (18) |
|
|
|
|
|
|
|
190 | (1) |
|
9.2 IEEE 802.1ah HaLow: an overview |
|
|
191 | (3) |
|
9.2.1 Use cases for HaLow |
|
|
192 | (1) |
|
|
193 | (1) |
|
9.3 Link set-up in HaLow networks for massive IoT devices registration |
|
|
194 | (3) |
|
9.3.1 Link set-up in WLANs |
|
|
194 | (2) |
|
9.3.2 Distributed authentication control |
|
|
196 | (1) |
|
9.3.3 Centralized authentication control |
|
|
196 | (1) |
|
9.4 Case study: hybrid slotted-CSMA/CA-TDMA |
|
|
197 | (6) |
|
9.4.1 SIFT geometric distribution |
|
|
199 | (2) |
|
9.4.2 Expected number of AuthReq frames in a C-Slot |
|
|
201 | (2) |
|
|
203 | (4) |
|
|
204 | (3) |
|
10 Statistical analysis of low-power sensor motes used in IoT applications |
|
|
207 | (22) |
|
|
|
|
207 | (1) |
|
|
208 | (2) |
|
10.3 Data set: Mica2Dot sensors and statistical analysis |
|
|
210 | (14) |
|
10.3.1 Descriptive analysis |
|
|
210 | (4) |
|
10.3.2 Linear regression model (ordinary least squares estimates) |
|
|
214 | (2) |
|
10.3.3 Ordered logit models |
|
|
216 | (8) |
|
10.4 Conclusion and future works |
|
|
224 | (3) |
|
|
224 | (3) |
|
Appendix A Variables by duration groups |
|
|
227 | (2) |
|
11 Conclusions and recommendations |
|
|
229 | (4) |
|
Index |
|
233 | |