PRZEDMIOTEM OFERTY JEST KOD DOSTĘPOWY DO KSIĄŻKI ELEKTRONICZNEJ (EBOOK)
KSIĄŻKA JEST DOSTĘPNA NA ZEWNĘTRZNEJ PLATFORMIE. KSIĄŻKA NIE JEST W POSTACI PLIKU.
The rise of technology has proven to be a threat to personal data, cyberspace protection, and organizational security. However, these technologies can be used to enhance the effectiveness of institutional security. Through the use of blockchain and the internet of things (IoT), organizations may combat cybercriminals and better protect their privacy. The Research Anthology on Convergence of Blockchain, Internet of Things, and Security describes the implementation of blockchain and IoT technologies to better protect personal and organizational data as well as enhance overall security. It also explains the tools, applications, and emerging innovations in security and the ways in which they are enhanced by blockchain and IoT. Covering topics such as electronic health records, intrusion detection, and software engineering, this major reference work is an essential resource for business leaders and executives, IT managers, computer scientists, hospital administrators, security professionals, law enforcement, students and faculty of higher education, librarians, researchers, and academicians.
- Autorzy: Management Association Information Resources
- Wydawnictwo: IGI Global
- Data wydania: 2022
- Wydanie:
- Liczba stron:
- Forma publikacji: ePub (online)
- Język publikacji: angielski
- ISBN: 9781668471340
BRAK MOŻLIWOŚCI POBRANIA PLIKU. Drukowanie: OGRANICZENIE DO 2 stron. Kopiowanie: OGRANICZENIE DO 2 stron.
- Cover
- Title Page
- Copyright Page
- Editor-in-Chief
- Associate Editors
- Editorial Advisory Board
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: A Holistic View on Blockchain and Its Issues
- ABSTRACT
- INTRODUCTION
- 2. BLOCKCHAIN WORKING, ITS TYPES & CONSENSUS
- 3. CHALLENGES AND ISSUES OF BLOCKCHAIN
- 4. DISCUSSING BLOCKCHAIN ISSUES ON SPECIFIC APPLICATIONS
- 5. CONCLUSION
- REFERENCES
- Chapter 2: Concept of Blockchain Technology and Its Emergence
- ABSTRACT
- EMERGENCE OF BLOCKCHAIN
- CONCLUSION
- REFERENCES
- Chapter 3: Introduction of Blockchain and Usage of Blockchain in Internet of Things
- ABSTRACT
- INTRODUCTION
- BLOCKCHAIN
- CONSENSUS
- ASSETS
- SMART CONTRACTS
- EXISTING BLOCKCHAIN TECHNOLOGIES
- USAGE OF BLOCKCHAIN IN IOT
- CHALLENGES OF USING BLOCKCHAIN IN IOT
- BLOCKCHAIN IN IOT SECURITY
- ADVANTAGES OF BLOCKCHAIN OVER CLOUD IN IOT
- BLOCKCHAIN FOR SUPPLY CHAIN SECURITY IN IOT
- BLOCKCHAIN FOR ACCESS CONTROL IN IOT
- CONCLUSION
- REFERENCES
- Chapter 4: A Novel Survey on Blockchain for Internet of Things
- ABSTRACT
- INTRODUCTION
- EXISTING BLOCKCHAIN TECHNOLOGIES
- BLOCKCHAIN FOR THE INTERNET OF THINGS
- BLOCKCHAINFOR IOT: APPLICATIONS
- BLOCKCHAIN FOR IOT: TECHNOLOGIES
- BLOCKCHAIN SOLUTIONS FOR IOT SECURITY
- POSSIBLE FUTURE DIRECTIONS
- CONCLUSION
- REFERENCES
- Chapter 5: Security Aspects of the Internet of Things
- ABSTRACT
- I. INTRODUCTION
- II. ASPECTS OF IOT NETWORK PROCESSING CYCLE
- III. IOT SECURITY CONCERNS
- IV. IOT SECURITY AND LAYERS ARCHITECTURE
- V. COUNTERMEASURES
- VI. FUTURE DIRECTIONS
- VII. CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 6: A Study on Data Sharing Using Blockchain System and Its Challenges and Applications
- ABSTRACT
- INTRODUCTION
- OUR CONTRIBUTION
- MOTIVATION
- OVERVIEW OF BLOCKCHAIN TECHNOLOGY
- CLASSIFICATION OF BLOCKCHAIN
- PROPERTIES OF BLOCKCHAIN
- APPLICATION OF BLOCKCHAIN IN DATA SHARING
- THE ARCHITECTURE OF BLOCKCHAIN IN DATA SHARING
- LITERATURE SURVEY
- SURVEY BASED ON INCENTIVE MECHANISM
- SURVEY BASED ON ACCESS CONTROL AND ENCRYPTION METHOD
- SURVEY BASED ON HEALTHCARE DATA SHARING SCHEME
- SURVEY BASED ON IOT DATA SHARING
- SUMMARY OF EXISTING WORK ON DATA SHARING WITH BLOCKCHAIN
- SECURITY CHALLENGES OF BLOCKCHAIN SYSTEM
- CONCLUSION
- REFERENCES
- Chapter 7: Application of Technology in Healthcare
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 2: Development and Design Methodologies
- Chapter 8: Blockchain-Enabled Secure Internet of Things
- ABSTRACT
- 1. INTRODUCTION
- 2. BACKGROUND
- 3. THE BLOCKCHAIN APPROACH
- 4. CHALLENGES TO SECURE IOT DEPLOYMENTS
- 5. IS BLOCKCHAIN THE ANSWER TO IOT SECURITY?
- 6. THE BLOCKCHAIN AND IOT
- 7. RESOLVING IOT SECURITY ISSUES WITH BLOCKCHAIN TECHNOLOGY
- 8. CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 9: Consequent Formation in Security With Blockchain in Digital Transformation
- ABSTRACT
- INTRODUCTION
- WHAT IS BLOCKCHAIN?
- LITERATURE REVIEW
- HOW BLOCKCHAIN WORKS
- BLOCKCHAIN ARCHITECTURE
- FEATURES OF BLOCKCHAIN
- SECURITY THROUGH BLOCKCHAIN
- DATA SAFETY USING BLOCKCHAIN
- CYBER SECURITY IN BLOCKCHAIN TECHNOLOGY
- DIGITAL IDENTITY USING BLOCKCHAIN TECHNOLOGY
- BLOCKCHAIN IN BANKING SECTOR
- BLOCKCHAIN IN HEALTH CARE
- BLOCKCHAIN IN EDUCATION
- SUMMARY
- REFERENCES
- Chapter 10: Blockchain-Based Data Market (BCBDM) Framework for Security and Privacy
- ABSTRACT
- INTRODUCTION
- MARKET AND RELATED RESEARCH
- DESIGN GOALS OF BLOCKCHAIN DATA MARKET
- SYSTEM ARCHITECTURE
- BCBDM SYSTEM IMPLEMENTATION AND VERIFICATION
- CONCLUSION
- REFERENCES
- Chapter 11: A Reliable Hybrid Blockchain-Based Authentication System for IoT Network
- ABSTRACT
- 1. INTRODUCTION
- 2. MOTIVATION
- 3. LITERATURE SURVEY
- 4. PROPOSED ARCHITECTURE
- 5. ANALYSIS OF THE WORK
- 6. FUTURE WORK
- 7. CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 12: Towards the Integration of Blockchain and IoT for Security Challenges in IoT
- ABSTRACT
- INTRODUCTION
- INTERNET OF THINGS
- SECURITY ISSUES IN IOT ENVIRONMENT
- BLOCKCHAIN TECHNOLGY
- BLOCKCHAIN BASED SOLUTIONS FOR IOT ENVIRONMENT
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- Chapter 13: Adaptation of Blockchain Architecture to the Internet of Things and Performance Analysis
- ABSTRACT
- INTRODUCTION
- MATERIALS AND METHODS
- FINDINGS
- CONCLUSION
- REFERENCES
- Chapter 14: Blockchain Technology With the Internet of Things in Manufacturing Data Processing Architecture
- ABSTRACT
- INTRODUCTION
- BACKGROUND OF MANUFACTURING NETWORK DATA MANAGEMENT
- DECENTRALIZED MANUFACTURING AUTOMATION TECHNOLOGIES
- CHALLENGES FOR BLOCKCHAIN-BASED IoT APPLICATION
- PROPOSED ENTERPRISE ARCHITECTURE
- RELATED RESEARCH
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 15: Current Trends in Integrating the Blockchain With Cloud-Based Internet of Things
- ABSTRACT
- I INTRODUCTION
- II POTENTIAL ATTACKS IN IOT
- III OVERVIEW OF BLOCKCHAIN
- IV CHALLENGES OF BLOCKCHAIN-IOT INTEGRATION
- V DIFFERENT CONSENSUS MODELS
- VI SELECTION OF BLOCKCHAIN TECHNOLOGY FOR IOT SECURITY
- VII THE IOT ARCHITECTURE PATTERN BASED ON A BLOCKCHAIN TECHNOLOGY
- VI CONCUSION
- REFERENCES
- Chapter 16: IoT-Fog-Blockchain Framework
- ABSTRACT
- INTRODUCTION
- 2. BACKGROUND
- 3. MAIN FOCUS OF THE RESEARCH
- CONCLUSION
- REFERENCES
- Chapter 17: Blockchain-Empowered Big Data Sharing for Internet of Things
- ABSTRACT
- INTRODUCTION
- RELATED WORK
- BLOCKCHAIN-EMPOWERED IOT BIG DATA SHARING FRAMEWORK
- ADVANTAGES AND OPEN ISSUES
- CASE STUDY: PRIVACY-PRESERVING INCENTIVE MECHANISM FOR BLOCKCHAIN-EMPOWERED IOT BIG DATA SHARING
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 18: Integrating Blockchain and IoT in Supply Chain Management
- ABSTRACT
- INTRODUCTION
- SUPPLY CHAIN MANAGEMENT (SCM)
- CENTRALIZED VS DECENTRALIZED
- BLOCKCHAIN
- METADATA OF A BLOCK
- HOW DO BLOCKCHAINS WORK?
- PEER-TO-PEER NETWORK - DECENTRALIZED & DISTRIBUTED NETWORK
- GAME THEORY
- SUPPLY CHAIN INTEGRATION
- METHODS OF TOKEN IN BLOCKCHAIN
- INTERNET OF THINGS
- CONCLUSION
- REFERENCES
- Chapter 19: Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications
- ABSTRACT
- INTRODUCTION
- RESEARCH OBJECTIVE
- PUBLIC KEY INFRASTRUCTURE
- WEB OF TRUST
- BLOCKCHAIN PKI
- REAL WORLD STATUS OF PKI
- SECURITY OF CLOUD AND IOT
- SUMMARY OF THE LITERATURE
- RELATED RESEARCH
- PROPOSED SOLUTION AND METHODOLOGY
- PERFORMANCE AND RESULTS
- CONCLUSION
- REFERENCES
- Chapter 20: A Novel Intrusion Detection System for Internet of Things Network Security
- ABSTRACT
- INTRODUCTION
- BACKGROUND AND RELATED WORK
- PROPOSED BIOTIDS FRAMEWORK
- DISCUSSION AND FINDINGS
- CONCLUSION AND FUTURE WORK
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 21: Information Sharing for Manufacturing Supply Chain Management Based on Blockchain Technology
- ABSTRACT
- INTRODUCTION
- OVERVIEW OF APPAREL MANUFACTURING SUPPLY CHAIN
- BACKGROUND INFORMATION
- ENTERPRISE INFORMATION SYSTEM ARCHITECTURE
- RELATED RESEARCH WORKS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 22: Developing Smart Buildings Using Blockchain, Internet of Things, and Building Information Modeling
- ABSTRACT
- INTRODUCTION
- BIM, IOT AND BUILDING AS A SERVICE (BAAS) MODEL
- THE PROPOSED SYSTEM ARCHITECTURE
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 23: Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices
- ABSTRACT
- 1. INTRODUCTION
- 2. IOT AND IDENTITY
- 3. COMPOSITE IDENTITY: A THEORETICAL PERSPECTIVE
- 4. IOT AND BLOCKCHAIN
- 5. COMPOSITE IDENTITY-OF-THINGS (CIDOT) FRAMEWORK ON IOT-BLOCKCHAIN NETWORK
- 6. CONCLUSION
- REFERENCES
- Chapter 24: Privacy Preserving Data Mining as Proof of Useful Work
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- WHY PRIVACY-PRESERVING DATA MINING
- RELATED WORKS
- CONCLUSION
- REFERENCES
- ENDNOTES
- Chapter 25: Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems
- ABSTRACT
- 1. INTRODUCTION
- 2. ANALYTIC FRAMEWOK
- 3. REVIEW OF THE LITERATURE
- 4. LITERATURE ANALYSIS AND DISCUSSION
- 5. CONCLUSION AND FUTURE WORKS
- REFERENCES
- Chapter 26: SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT Systems
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- SECURE SOFTWARE ENGINEERING FRAMEWORK FOR CPS AND IOT (SSEF4CPSIOT)
- INTEGRATED SECURE AND PRIVACY DRIVEN CPS-IOT SERVICE DEVELOPMENT PARADIGM
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- Section 3: Tools and Technologies
- Chapter 27: Blockchain for Industrial Internet of Things (IIoT)
- ABSTRACT
- 1.1 INTRODUCTION
- 1.6 CONCLUSION
- REFERENCES
- APPENDIX
- Chapter 28: Blockchain Technology-Security Booster
- ABSTRACT
- INTRODUCTION
- CONCLUSION
- REFERENCES
- Chapter 29: Blockchain With the Internet of Things
- ABSTRACT
- INTRODUCTION
- DIGITATION OF MANUFACTURING BUSINESS PROCESS
- BACKGROUND OF BLOCKCHAIN TECHNOLOGY
- SECURITY-RELATED RESEARCH FOR BLOCKCHAIN TECHNOLOGY
- BLOCKCHAIN SECURITY AND PRIVACY ISSUES
- THREAT MODELS FOR BLOCKCHAIN
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- Chapter 30: Securing the Internet of Things Applications Using Blockchain Technology in the Manufacturing Industry
- ABSTRACT
- INTRODUCTION
- DIGITATION OF MANUFACTURING BUSINESS PROCESS
- IoT ARCHITECTURE AND SECURITY CHALLENGES
- BACKGROUND OF BLOCKCHAIN TECHNOLOGY
- SECURING IoT APPLICATIONS USING BLOCKCHAIN
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 31: The Internet of Things and Blockchain Technologies Adaptive Trade Systems in the Virtual World
- ABSTRACT
- INTRODUCTION IN VIRTUAL WORD AND TRADITIONAL TRADING PROCESS
- BACKGROUND IN VIRTUAL WORD AND TRADITIONAL TRADING PROCESS
- MAIN FOCUS OF THE ARTICLE
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 32: Protection to Personal Data Using Decentralizing Privacy of Blockchain.
- ABSTRACT
- INTRODUCTION
- WHAT IS THE PERSONAL DATA?
- FEATURES OF BLOCKCHAIN
- TYPES OF BLOCKCHAIN
- WORKING OF BLOCKCHAIN
- FRAMEWORKS OF BLOCKCHAIN
- PROCESS TO ADD BLOCK INTO THE BLOCKCHAIN
- SECURITY TECHNIQUES
- EXAMPLE: BITCOIN SYSTEM
- FUTURE TRENDS
- CONCLUSION
- REFERENCES
- Chapter 33: Reliable (Secure, Trusted, and Privacy Preserved) Cross-Blockchain Ecosystems for Developing and Non-Developing Countries
- ABSTRACT
- INTRODUCTION
- BLOCKCHAIN TECHNOLOGY IN DEVELOPED COUNTRIES
- CAN BLOCKCHAIN HELP IN DEVELOPING COUNTRIES?
- BLOCKCHAIN IN AUTONOMOUS VEHICLE
- ELECTRONIC MEDICAL RECORD
- BLOCKCHAIN SECURITY AND PRIVACY
- BLOCKCHAIN BASED CROWD SENSING SYSTEM
- BLOCKHAIN TECHNOLOGY FOR E-MARKETPLACE
- PROPERTY RIGHTS
- CONTROLLING CORRUPTION
- BLOCKCHAIN TECHNOLOGY OPPORTUNITIES IN UNDEVELOPED COUNTRIES
- DANGERS AND RISKS
- CONCLUSION
- REFERENCES
- Chapter 34: Data Security in Clinical Trials Using Blockchain Technology
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- BLOCKCHAIN IN CLINICAL TRIALS
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 35: A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
- ABSTRACT
- INTRODUCTION
- RELATED WORKS
- PRELIMINARIES
- THE PROPOSED SCHEME
- SECURITY ANALYSIS
- PERFORMANCE ANALYSIS
- CONCLUSION AND FUTURE RESEARCH
- REFERENCES
- Chapter 36: A Reliable Blockchain-Based Image Encryption Scheme for IIoT Networks
- ABSTRACT
- 1. INTRODUCTION
- 2. LITERATURE SURVEY
- 4. PROPOSED WORK
- 5. ANALYSIS OF THE WORK
- 6. FUTURE WORK
- 7. CONCLUSION
- REFERENCES
- Chapter 37: A Survey of Blockchain-Based Solutions for IoTs, VANETs, and FANETs
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- IOTs, VANETs, AND FANETs: VULNERABILITIES, THREATS, AND ATTACKS
- BLOCKCHAIN-BASED SOLUTIONS FOR IOT, VANETs AND FANETs SECURITY
- OPEN RESEARCH
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 38: IoT Data Compression and Optimization Techniques in Cloud Storage
- ABSTRACT
- 1. INTRODUCTION
- 2. IOT-CLOUD ECOSYSTEM
- 3. IOT DATA STORAGE MANAGEMENT
- 4. DATA MINING FOR IOT
- 5. DATA COMPRESSION IN IOT
- 6. DATA OPTIMIZATION AND ENERGY CONSUMPTION IN IOT
- 7. APPLICATIONS
- 8. SCOPE, LIMITATIONS AND FUTURE DIRECTIONS
- 9. CONCLUSION
- REFRENCES
- Chapter 39: A Reliable IDS System Using Blockchain for SDN-Enabled IIoT Systems
- ABSTRACT
- 1. INTRODUCTION
- 2. LITERATURE SURVEY
- 3. ASSUMPTIONS MADE IN THE WORK
- 4. PREVIOUS WORK ARCHITECTURE
- 5. PROPOSED ARCHITECTURE
- 6. ANALYSIS OF THE WORK
- 7. CONCLUSION
- REFERENCES
- Chapter 40: BLOFF
- ABSTRACT
- 1. INTRODUCTION
- 2. BACKGROUND
- 3. RELATED WORK
- 4. PROPOSED MODEL
- 5. VERIFICATION OF LOGS
- 6. DISCUSSION
- 7. CONCLUSION
- REFERENCES
- Chapter 41: Identification of a Person From Live Video Streaming Using Machine Learning in the Internet of Things (IoT)
- ABSTRACT
- INTRODUCTION
- RELATED WORK
- PRELIMINARIES
- RESEARCH GAP
- PROBLEM STATEMENTS
- PROPOSED METHODOLOGY
- PERFORMANCE EVALUATION
- FUTURE WORK
- CONCLUSION
- REFERENCES
- Chapter 42: Security and Privacy for Electronic Healthcare Records Using AI in Blockchain
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- VULNERABILITIES IN HEALTH CARE DATA STORAGE
- WORKING OF BLOCKCHAIN
- BLOCKCHAIN IN HEALTHCARE
- CONCLUSION
- REFERENCES
- Chapter 43: Use of Internet of Things With Data Prediction on Healthcare Environments
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- ARTICLE SELECTION
- STATE OF THE ART
- CHALLENGES AND POSSIBILITIES
- SECURITY AND PRIVACY
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 44: Cyber Security and Cyber Resilience for the Australian E-Health Records
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- Electronic Health Records: The Question of Individual Privacy
- BLOCKCHAIN FOR ELECTRONIC HEALTH RECORDS
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- Section 4: Utilization and Applications
- Chapter 45: Perspectives of Blockchain in Cybersecurity
- ABSTRACT
- INTRODUCTION
- CHARACTERISTICS OF BLOCKCHAIN
- CURRENT CYBERSECURITY PARADIGMS
- CYBERSECURITY SOLUTIONS AND DISCUSSION
- FUTURE TRAJECTORIES AND DISCUSSION
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 46: Conceptual Insights in Blockchain Technology
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- ISSUES AND CHALLENGES IN BLOCKCHAIN TECHNOLOGY
- APPLICATIONS OF BLOCKCHAIN TECHNOLOGIES
- CONCLUSION
- FUTURE DIRECTIONS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 47: Security for IoT
- ABSTRACT
- 1. INTRODUCTION
- 2. BACKGROUND
- 3. FACTORS THAT MAKE IOT VULNERABLE TO SECURITY
- 3. SECURITY ISSUES FOR FIVE LAYERED ARCHITECTURE OF IOT
- 4. INTERNET OF THINGS SECURITY SOLUTIONS
- 5. TECHNOLOGIES FOR SECURITY OF IOT
- 6. FUTURE DIRECTIONS
- 7. CONCLUSION
- REFERENCES
- Chapter 48: Securing IoT Applications Using Blockchain
- ABSTRACT
- I. INTRODUCTION
- II. CHALLENGES AND SECURITY THREATS IN THE IOT ECOSYSTEM
- III. BLOCKCHAIN CONCEPTS
- IV. WHY DO WE NEED BLOCKCHAIN IN IOT?
- V. STATE OF THE ART AND EXISTING RESEARCH IN BLOCKCHAIN BASED IOT (BIOT)
- VI. FUTURE WORK
- VII. CONCLUSIONS
- REFERENCES
- Chapter 49: Blockchain Technology Integration in IoT and Applications
- ABSTRACT
- INTRODUCTION
- TAXONOMY OF IOT SECURITY ISSUES
- SECURITY SOLUTIONS FOR PHYSICAL AND DATA LINK LAYER ATTACKS
- BLOCKCHAIN SECURITY
- CONSENSUS, MINING, MESSAGE VALIDATION MECHANISMS IN BLOCKCHAIN
- BLOCKCHAIN AND INTERNET OF THINGS INTEGRATION
- BLOCKCHAIN: IOT INTEGRATION CHALLENGES
- APPLICATIONS OF BLOCKCHAIN-IOT
- FUTURE CHALLENGES, DIRECTIONS, AND ISSUES
- CONCLUSION
- REFERENCES
- Chapter 50: Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises
- ABSTRACT
- INTRODUCTION
- CONSENSUS ALGORITHMS
- CHALLENGES OF BLOCKCHAIN TECHNOLOGY
- INTERNET OF THING (IoT)
- CONCLUSION
- REFERENCES
- Chapter 51: Optimization of Consensus Mechanism for IoT Blockchain
- ABSTRACT
- INTRODUCTION
- IOT-BLOCKCHAIN CONSENSUS MECHANISM APPLICATION STATUS
- RESEARCH ON OPTIMIZATION OF IOT BLOCKCHAIN CONSENSUS MECHANISM
- ARCHITECTURE OPTIMIZATION SERVICES
- CONCLUSION
- REFERENCES
- Chapter 52: Blockchain Technology for the Internet of Things Applications in Apparel Supply Chain Management
- ABSTRACT
- INTRODUCTION
- INTERNET OF THINGS AND ITS APPLICATIONS IN APPAREL INDUSTRY
- BLOCKCHAIN TECHNOLOGY IN APPAREL BUSINESS
- BLOCKCHAIN APPLICATIONS FOR THE IoT
- BLOCKCHAIN SECURITY AND PRIVACY ISSUES
- THREAT MODELS FOR BLOCKCHAIN
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 53: Blockchain-Based Industrial Internet of Things for the Integration of Industrial Process Automation Systems
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- CONVERGENCE OF BLOCKCHAIN-BASED IIOT AND IPAS
- ISSUES AND CHALLENGES IN BLOCKCHAIN-BASED IPAS INTEGRATION
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Chapter 54: Blockchain Advances and Security Practices in WSN, CRN, SDN, Opportunistic Mobile Networks, Delay Tolerant Networks
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- SECURITY CONCERNS IN DIVERSE NETWORKS
- BLOCKCHAIN ADVANCES AND SECURITY PRACTICES IN DIVERSE NETWORKS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 55: Advanced Cyber Security and Internet of Things for Digital Transformations of the Indian Healthcare Sector
- ABSTRACT
- INTRODUCTION
- REVIEW OF LITERATURE
- OBJECTIVE OF THE STUDY
- RESEARCH METHODOLOGY
- USE OF DIGITAL TECHNOLOGY IN HEALTHCARE SECTOR
- APPLICATIONS OF DIGITAL TECNOLOGY IN THE HEALTHCARE SECTOR
- NEED FOR CYBERSECURITY IN PHASE OF DIGITAL TRANSFORMATION
- CYBER SECURITY ROADMAP
- EMERGING MEDICAL DEVICES IN THE ERA OF DIGITALIZATION
- ELEMENTS OF ADVANCED BLOCKCHAIN TECHNOLOGY
- CYBER THREATS IN THE DIGITAL TRANSFORMATION OF HEALTHCARE SECTOR
- WORLDWIDE ADVANCED TECHONLOGY APPLICATIONS IN HEALTHCARE SECTOR
- RECENT DEVELOPMENTS IN BLOCKCHAIN TECHNOLOGY
- MEASURES TO MITIGATE CYBER RISK IN WAKE OF DIGITALIZATION
- MAJOR FINDINGS OF THE STUDY
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- ACKNOWLEDGMENT
- REFERENCES
- Section 5: Organizational and Social Implications
- Chapter 56: Blockchain Technology for IoT
- ABSTRACT
- 1. INTRODUCTION
- 2. BACKGROUND
- 3. SECURITY CHALLENGES OF IOT AND INTEGRATION OF BLOCKCHAIN TECHNOLOGY
- 4. SOLUTIONS AND RECOMMENDATIONS
- 5. CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 57: Role and Impact of Blockchain in Cybersecurity
- ABSTRACT
- INTRODUCTION TO BLOCKCHAIN
- BACKGROUND
- PRIVATE AND PUBLIC BLOCKCHAIN
- METHODOLOGY
- OUTCOMES
- CYBERCRIMES COME IN DIFFERENT FORMS
- FUTURE EXPLORATION HEADINGS OF BLOCKCHAIN DIGITAL PROTECTION
- VARIOUS SERVICES USING BLOCKCHAIN TECHNOLOGY
- ADVANTAGES AND DISADVANTAGES OF IMPLEMENTING BLOCKCHAIN TECHNOLOGY
- CONCLUSION
- REFERENCES
- Chapter 58: Issues and Challenges (Privacy, Security, and Trust) in Blockchain-Based Applications
- ABSTRACT
- 1. INTRODUCTION
- 2. RELATED WORK
- 3. MOTIVATION
- 4. SCOPE OF THE WORK/ BLOCKCHAIN BASED APPLICATIONS IN PRESENT AND FUTURE
- 5. OPEN ISSUES IN BLOCKCHAIN BASED APPLICATIONS
- 6. TOOLS, METHODS AND ALGORITHMS FOR BLOCKCHAIN BASED APPLICATIONS
- 7. FUTURE RESEARCH DIRECTIONS USING BLOCKCHAIN APPLICATIONS
- 8. AN OPEN DISCUSSION: BLOCKCHAIN BASED APPLICATIONS IS A NECESSITY OR JUST A TREND
- 9. SUMMARY
- REFERENCES
- KEY TERMS AND DEFINITIONS
- APPENDIX A
- Chapter 59: Security, Privacy, and Trust Management and Performance Optimization of Blockchain
- ABSTRACT
- INTRODUCTION
- WHY BLOCKCHAIN?
- STRUCTURE OF BLOCKCHAIN
- PERMISSIONED VS. PERMISSIONLESS BLOCKCHAIN
- VARIOUS PLATFORMS FOR IMPLEMENTING BLOCKCHAIN
- FEATURES OF A BLOCKCHAIN PLATFORM
- PRIVACY OF THE BLOCKCHAIN
- SECURITY OF THE BLOCKCHAIN
- TRUST IN BLOCKCHAIN
- PERFORMANCE ANALYSIS AND OPTIMIZATION OF THE BLOCKCHAIN TECHNOLOGY
- CONCLUSION
- REFERENCES
- Chapter 60: Blockchain Revolution
- ABSTRACT
- INTRODUCTION
- THEORETICAL BACKGROUND
- VARIOUS PROBLEMS ASSOCIATED WITH BLOCKCHAIN IMPLEMENTATION
- SUGGESTIONS
- POSSIBLE FUTURE DIRECTIONS
- CONCLUSION
- REFERENCES
- Chapter 61: Blockchain and the Research Libraries
- ABSTRACT
- INTRODUCTION
- HIEARCHY OF IMPLEMENTING BLOCKCHAIN INTO RESEARCH LIBRARIES
- BLOCKCHAIN TECHNOLOGY IN THE RESEARCH LIBRARY
- PROBLEMS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 62: Millennials vs. Cyborgs and Blockchain Role in Trust and Privacy
- ABSTRACT
- INTRODUCTION
- THEORIES AND PRINCIPLES AND EVOLUTION OF MARKETING CHANNELS IN DIGITAL ERA
- TECHNOLOGY DEVELOPMENT AND ADOPTION THEORY
- DIGITAL FOOTPRINTS AND THE VALUE OF DATA
- THE ROLE OF PRIVACY AND TRANSPARENCY IN THE DIGITAL ERA
- BLOCKCHAIN BACKGROUND
- BLOCKCHAIN IMPACTS IN DIFFERENT SECTORS
- IMPORTANCE OF BLOCKCHAIN APPLICATIONS IN THE RETAIL SECTOR
- DIGITAL IDENTITIES AND BLOCKCHAIN
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 63: Decentralizing Privacy Using Blockchain to Protect Private Data and Challanges With IPFS
- ABSTRACT
- WHAT IS BLOCKCHAIN?
- WHY BLOCKCHAIN?
- HOW DOES A BLOCKCHAIN WORK?
- CONTENTS OF A BLOCK IN BLOCKCHAIN
- CASE STUDY
- REFERENCES
- Chapter 64: Blockchain and IoT Integration in Dairy Production to Survive the COVID-19 Situation in Sri Lanka
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- MAIN FOCUS OF THE CHAPTER
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 6: Managerial Impact
- Chapter 65: Applying Blockchain Security for Agricultural Supply Chain Management
- ABSTRACT
- INTRODUCTION
- LITERATURE SURVEY
- PROJECT DESCRIPTION
- IMPLEMENTATION AND RESULT
- CONCLUSION
- FUTURE WORK
- REFERENCES
- Chapter 66: Security Issues of Blockchain-Based Information System to Manage Supply Chain in a Global Crisis
- ABSTRACT
- INTRODUCTION
- INTERNET OF THINGS AND ITS APPLICATIONS IN APPAREL INDUSTRY
- INTERNET OF THINGS AND ITS APPLICATIONS IN APPAREL INDUSTRY
- BLOCKCHAIN TECHNOLOGY IN APPAREL BUSINESS
- BLOCKCHAIN APPLICATIONS FOR THE IoT
- BLOCKCHAIN SECURITY AND PRIVACY ISSUES
- THREAT MODELS FOR BLOCKCHAIN
- CONCLUSION
- REFERENCES
- Chapter 67: Blockchain and IoT-Based Diary Supply Chain Management System for Sri Lanka
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- MAIN FOCUS OF THE CHAPTER
- SOLUTIONS AND RECOMMENDATIONS
- RESULT AND FINDING
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Section 7: Critical Issues and Challenges
- Chapter 68: A Comprehensive Review of the Security and Privacy Issues in Blockchain Technologies
- ABSTRACT
- INTRODUCTION
- STRUCTURE OF BLOCKCHAIN
- ELEMENTS OF BLOCKCHAIN
- SECURITY ISSUES OF BLOCKCHAIN TECHNOLOGY
- PRIVACY ISSUES OF BLOCKCHAIN TECHNOLOGY
- BLOCKCHAIN APPLICATION
- BLOCKCHAIN CHALLENGES
- CONCLUSION
- REFERENCES
- Chapter 69: A Review on the Importance of Blockchain and Its Current Applications in IoT Security
- ABSTRACT
- BLOCKCHAIN IN IOT
- BLOCK CHAIN FOR EDUCATION
- REFERENCES
- Chapter 70: Blockchain With IoT and AI
- ABSTRACT
- 1. INTRODUCTION
- 2. REASEARCH METHODOLOGY
- 3. BLOCKCHAIN WITH IOT AND AI IN AGRICULTURE
- 4. BLOCKCHAIN WITH IOT AND AI IN HEATHCARE
- 5. RESULT AND DISCUSSION
- 6. CONCLUSION
- REFERENCES
W tej ofercie kupujesz kod dostępowy umożliwiający dostęp do wskazanej treści. Kod umożliwia dostęp do treści za pomocą przeglądarki WWW, dedykowanej aplikacji iOS (Apple) ze sklepu App Store lub dedykowanej aplikacji Android ze sklepu Play. Kod oraz instrukcje otrzymasz pocztą elektroniczną niezwłocznie po zaksięgowaniu płatności. Brak możliwości pobrania pliku.
Na podstawie art. 38 pkt 13 Ustawy z dnia 30 maja 2014 roku o prawach konsumenta realizując kod dostępowy rezygnujesz z prawa do odstąpienia od umowy zawartej na odległość.
Typ licencji: licencja wieczysta.
BRAK MOŻLIWOŚCI POBRANIA PLIKU.
NIE PRZESYŁAMY PLIKÓW E-MAILEM.