Muutke küpsiste eelistusi

Security Issues and Privacy Concerns in Industry 4.0 Applications [Kõva köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 272 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 20-Aug-2021
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119775620
  • ISBN-13: 9781119775621
Teised raamatud teemal:
  • Formaat: Hardback, 272 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 20-Aug-2021
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119775620
  • ISBN-13: 9781119775621
Teised raamatud teemal:
SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS Written and edited by a team of international experts, this is the most comprehensive and up-to-date coverage of the security and privacy issues surrounding Industry 4.0 applications, a must-have for any library.

The scope of Security Issues and Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trends and the need for technological change in Industry 4.0.

Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT-based health care management systems, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.

Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.
Preface xiii
1 Industry 4.0: Smart Water Management System Using IoT 1(14)
S. Saravanan
N. Renugadevi
C.M. Naga Sudha
Parul Tripathi
1.1 Introduction
2(2)
1.1.1 Industry 4.0
2(1)
1.1.2 IoT
2(1)
1.1.3 Smart City
3(1)
1.1.4 Smart Water Management
3(1)
1.2 Preliminaries
4(3)
1.2.1 Internet World to Intelligent World
4(1)
1.2.2 Architecture of IoT System
4(2)
1.2.3 Architecture of Smart City
6(1)
1.3 Literature Review on SWMS
7(4)
1.3.1 Water Quality Parameters Related to SWMS
8(1)
1.3.2 SWMS in Agriculture
8(1)
1.3.3 SWMS Using Smart Grids
9(1)
1.3.4 Machine Learning Models in SWMS
10(1)
1.3.5 IoT-Based SWMS
11(1)
1.4 Conclusion
11(1)
References
12(3)
2 Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues 15(20)
Abdullah Ayub Khan
Asif Ali Laghari
Shafique Awan
Awais Khan Jumani
2.1 Introduction
16(4)
2.1.1 Network Forensics
16(1)
2.1.2 The Fourth Industrial Revolution
17(1)
2.1.2.1 Machine-to-Machine (M2M) Communication
18(1)
2.1.3 Cloud Computing
18(6)
2.1.3.1 Infrastructure-as-a-Service (IaaS)
19(1)
2.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution
19(1)
2.2 Generic Model Architecture
20(4)
2.3 Model Implementation
24(4)
2.3.1 OpenNebula (Hypervisor) Implementation Platform
24(1)
2.3.2 NetworkMiner Analysis Tool
25(2)
2.3.3 Performance Matrix Evaluation & Result Discussion
27(1)
2.4 Cloud Security Impact on M2M Communication
28(2)
2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0)
29(1)
2.5 Conclusion
30(1)
References
31(4)
3 Regional Language Recognition System for Industry 4.0 35(20)
Bharathi V.
N. Renugadevi
J. Padmapriya
M. Vijayprakash
3.1 Introduction
36(3)
3.2 Automatic Speech Recognition System
39(10)
3.2.1 Preprocessing
41(1)
3.2.2 Feature Extraction
42(4)
3.2.2.1 Linear Predictive Coding (LPC)
42(2)
3.2.2.2 Linear Predictive Cepstral Coefficient (LPCC)
44(1)
3.2.2.3 Perceptual Linear Predictive (PLP)
44(1)
3.2.2.4 Power Spectral Analysis
44(1)
3.2.2.5 Mel Frequency Cepstral Coefficients
45(1)
3.2.2.6 Wavelet Transform
46(1)
3.2.3 Implementation of Deep Learning Technique
46(10)
3.2.3.1 Recurrent Neural Network
47(1)
3.2.3.2 Long Short-Term Memory Network
47(1)
3.2.3.3 Hidden Markov Models (HMM)
47(1)
3.2.3.4 Hidden Markov Models - Long Short-Term Memory Network (HMM-LSTM)
48(1)
3.2.3.5 Evaluation Metrics
49(1)
3.3 Literature Survey on Existing TSRS
49(3)
3.4 Conclusion
52(1)
References
52(3)
4 Approximation Algorithm and Linear Congruence: An Approach for Optimizing the Security of IoT-Based Healthcare Management System 55(34)
Anirban Bhowmik
Sunil Karforma
4.1 Introduction
56(6)
4.1.1 IoT in Medical Devices
56(1)
4.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System
57(1)
4.1.3 Cryptography and Secret Keys
58(1)
4.1.4 RSA
58(1)
4.1.5 Approximation Algorithm and Subset Sum Problem
58(1)
4.1.6 Significance of Use of Subset Sum Problem in Our Scheme
59(1)
4.1.7 Linear Congruence
60(1)
4.1.8 Linear and Non-Linear Functions
61(1)
4.1.9 Pell's Equation
61(1)
4.2 Literature Survey
62(1)
4.3 Problem Domain
63(1)
4.4 Solution Domain and Objectives
64(1)
4.5 Proposed Work
65(6)
4.5.1 Methodology
65(1)
4.5.2 Session Key Generation
65(2)
4.5.3 Intermediate Key Generation
67(2)
4.5.4 Encryption Process
69(1)
4.5.5 Generation of Authentication Code and Transmission File
70(1)
4.5.6 Decryption Phase
71(1)
4.6 Results and Discussion
71(14)
4.6.1 Statistical Analysis
72(1)
4.6.2 Randomness Analysis of Key
73(2)
4.6.3 Key Sensitivity Analysis
75(1)
4.6.4 Security Analysis
76(3)
4.6.4.1 Key Space Analysis
76(1)
4.6.4.2 Brute-Force Attack
77(1)
4.6.4.3 Dictionary Attack
77(1)
4.6.4.4 Impersonation Attack
78(1)
4.6.4.5 Replay Attack
78(1)
4.6.4.6 Tampering Attack
78(1)
4.6.5 Comparative Analysis
79(6)
4.6.5.1 Comparative Analysis Related to IoT Attacks
79(6)
4.6.6 Significance of Authentication in Our Proposed Scheme
85(1)
4.7 Conclusion
85(1)
References
86(3)
5 A Hybrid Method for Fake Profile Detection in Social Network Using Artificial Intelligence 89(24)
Ajesh F.
Aswathy S.U.
Felix M. Philip
Jeyakrishnan V.
5.1 Introduction
90(1)
5.2 Literature Survey
91(3)
5.3 Methodology
94(9)
5.3.1 Datasets
94(1)
5.3.2 Detection of Fake Account
94(1)
5.3.3 Suggested Framework
95(8)
5.3.3.1 Pre-Processing
97(1)
5.3.3.2 Principal Component Analysis (PCA)
98(1)
5.3.3.3 Learning Algorithms
99(3)
5.3.3.4 Feature or Attribute Selection
102(1)
5.4 Result Analysis
103(6)
5.4.1 Cross-Validation
103(1)
5.4.2 Analysis of Metrics
104(1)
5.4.3 Performance Evaluation of Proposed Model
105(1)
5.4.4 Performance Analysis of Classifiers
105(4)
5.5 Conclusion
109(1)
References
109(4)
6 Packet Drop Detection in Agricultural-Based Internet of Things Platform 113(18)
Sebastian Terence
Geethanjali Purushothaman
6.1 Introduction
113(1)
6.2 Problem Statement and Related Work
114(1)
6.3 Implementation of Packet Dropping Detection in IoT Platform
115(5)
6.4 Performance Analysis
120(9)
6.5 Conclusion
129(1)
References
129(2)
7 Smart Drone with Open CV to Clean the Railway Track 131(10)
Sujaritha M.
Sujatha R.
7.1 Introduction
132(1)
7.2 Related Work
132(2)
7.3 Problem Definition
134(1)
7.4 The Proposed System
134(3)
7.4.1 Drones with Human Intervention
134(1)
7.4.2 Drones without Human Intervention
135(2)
7.4.3 Working Model
137(1)
7.5 Experimental Results
137(2)
7.6 Conclusion
139(1)
References
139(2)
8 Blockchain and Big Data: Supportive Aid for Daily Life 141(38)
Awais Khan Jumani
Asif Ali Laghari
Abdullah Ayub Khan
8.1 Introduction
142(3)
8.1.1 Steps of Blockchain Technology Works
144(1)
8.1.2 Blockchain Private
144(1)
8.1.3 Blockchain Security
145(1)
8.2 Blockchain vs. Bitcoin
145(6)
8.2.1 Blockchain Applications
146(1)
8.2.2 Next Level of Blockchain
146(3)
8.2.3 Blockchain Architecture's Basic Components
149(1)
8.2.4 Blockchain Architecture
150(1)
8.2.5 Blockchain Characteristics
150(1)
8.3 Blockchain Components
151(4)
8.3.1 Cryptography
152(1)
8.3.2 Distributed Ledger
153(1)
8.3.3 Smart Contracts
153(1)
8.3.4 Consensus Mechanism
154(1)
8.3.4.1 Proof of Work (PoW)
155(1)
8.3.4.2 Proof of Stake (PoS)
155(1)
8.4 Categories of Blockchain
155(3)
8.4.1 Public Blockchain
156(1)
8.4.2 Private Blockchain
156(1)
8.4.3 Consortium Blockchain
156(1)
8.4.4 Hybrid Blockchain
156(2)
8.5 Blockchain Applications
158(2)
8.5.1 Financial Application
158(1)
8.5.1.1 Bitcoin
158(1)
8.5.1.2 Ripple
158(1)
8.5.2 Non-Financial Applications
159(28)
8.5.2.1 Ethereum
159(1)
8.5.2.2 Hyperledger
159(1)
8.6 Blockchain in Different Sectors
160(1)
8.7 Blockchain Implementation Challenges
160(3)
8.8 Revolutionized Challenges in Industries
163(7)
8.9 Conclusion
170(2)
References
172(7)
9 A Novel Framework to Detect Effective Prediction Using Machine Learning 179(16)
Shenbaga Priya
Revadi
Sebastian Terence
Jude Immaculate
9.1 Introduction
180(1)
9.2 ML-Based Prediction
180(2)
9.3 Prediction in Agriculture
182(1)
9.4 Prediction in Healthcare
183(1)
9.5 Prediction in Economics
184(1)
9.6 Prediction in Mammals
185(1)
9.7 Prediction in Weather
186(1)
9.8 Discussion
186(1)
9.9 Proposed Framework
187(2)
9.9.1 Problem Analysis
187(1)
9.9.2 Preprocessing
188(1)
9.9.3 Algorithm Selection
188(1)
9.9.4 Training the Machine
188(1)
9.9.5 Model Evaluation and Prediction
188(1)
9.9.6 Expert Suggestion
188(1)
9.9.7 Parameter Tuning
189(1)
9.10 Implementation
189(3)
9.10.1 Farmers and Sellers
189(1)
9.10.2 Products
189(1)
9.10.3 Price Prediction
190(2)
9.11 Conclusion
192(1)
References
192(3)
10 Dog Breed Classification Using CNN 195(12)
Sandra Varghese
Remya S.
10.1 Introduction
195(1)
10.2 Related Work
196(2)
10.3 Methodology
198(3)
10.4 Results and Discussions
201(2)
10.4.1 Training
201(1)
10.4.2 Testing
201(2)
10.5 Conclusions
203(1)
References
203(4)
11 Methodology for Load Balancing in Multi-Agent System Using SPE Approach 207(22)
S. Ajitha
11.1 Introduction
207(1)
11.2 Methodology for Load Balancing
208(5)
11.3 Results and Discussion
213(6)
11.3.1 Proposed Algorithm in JADE Tool
213(5)
11.3.1.1 Sensitivity Analysis
218(1)
11.3.2 Proposed Algorithm in NetLogo
218(1)
11.4 Algorithms Used
219(1)
11.5 Results and Discussion
219(7)
11.6 Summary
226(1)
References
226(3)
12 The Impact of Cyber Culture on New Media Consumers 229
Durmuf Kocak
12.1 Introduction
229(2)
12.2 The Rise of the Term of Cyber Culture
231(3)
12.2.1 Cyber Culture in the 21st Century
231(3)
12.2.1.1 Socio-Economic Results of Cyber Culture
232(1)
12.2.1.2 Psychological Outcomes of Cyber Culture
233(1)
12.2.1.3 Political Outcomes of Cyber Culture
234(1)
12.3 The Birth and Outcome of New Media Applications
234(10)
12.3.1 New Media Environments
236(8)
12.3.1.1 Social Sharing Networks
237(3)
12.3.1.2 Network Logs (Blog, Weblog)
240(1)
12.3.1.3 Computer Games
240(1)
12.3.1.4 Digital News Sites and Mobile Media
240(1)
12.3.1.5 Multimedia Media
241(1)
12.3.1.6 What Affects the New Media Consumers' Tendencies?
242(2)
12.4 Result
244(1)
References
245
Index 25
Shibin David is an assistant professor in the Department of Computer Science and Engineering at Karunya Institute of Technology and Sciences, India. His research interest includes cryptography, network security and mobile computing. He has an industry certification from Oracle, several awards, and a number of publications to his credit.

R. S. Anand is a researcher in the field of mechanical engineering at the Karunya Institute of Technology and Sciences, India, after being an assistant professor at the Narayana Guru College of Engineering from 2014 to 2016. He has numerous papers and presentations to his credit.

V. Jeyakrishnan, PhD, is an assistant professor at Saintgits College of Engineering, Kottayam, India. His research area includes wireless networks, cloud computing and its applications. He has a number of publications in his research area.

M. Niranjanamurthy, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He received his doctorate in computer science from JJTU, Rajasthan. He has over ten years of teaching experience and two years of industry experience as a software engineer. He has published four books, 70 papers, and has filed for 17 Patents with three so far granted. He is a reviewer for 22 international academic journals and has twice won Best Research Journal Reviewer award. He has numerous other awards and in is active in research associations.