+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future

  • Book

  • July 2021
  • Bentham Science Publishers Ltd
  • ID: 5401899
This reference presents information about different facets of IoT and blockchain systems that have been recently proposed for practical situations. Chapters provide knowledge about how these technologies are applied in functions related to trust management, identity management, security threats, access control and privacy.

Key Features:
  • Introduces the reader to fundamental concepts of IoT and blockchain technology
  • Reports advances in the field of IoT, ubiquitous computing and blockchain computing
  • Includes the applications of different frameworks
  • Explains the role of blockchains in improving IT security
  • Provides examples of smart grids, data transmission models, digital business platforms, agronomics and big data solutions
  • Includes references for further reading

Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future is a handy reference for information technology professionals and students who want updated information about applications of IoT and blockchains in secure operational and business processes.

Table of Contents

Chapter 1 an Overview of Smart Grid in the Current Age
1. Introduction
2. Smart Cities Concepts
3. Smart Grid Concepts
3.1. Smart Grid and IoT
3.2. Smart Grid Applications
3.3. Smart Grid Advantages
4. Smart Grid Infrastructure
5. Discussion
5.1. Infrastructure Generated by Smart Grid
5.2. Smart Grid as an Instrument of Innovation
5.3. Smart Grid Benefits
5.4. Blockchain for Smart Grids
  • Conclusion
  • Trends
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 2 Dynamic Strategies of Machine Learning for Extenuation Of Security Breaches in Wireless Sensor Networks
1. Introduction
2. Security Concerns in Wireless Sensor Networks
2.1. Eavesdropping Attack
2.2. Jamming Attack
2.3. Tampering
2.4. Exhaustion and Collision Attack
2.5. Sybil Attack
2.6. Blackhole Attack
2.7. Wormhole Attack
2.8. Grayhole Attack
2.9. Sinkhole Attack
2.10. Hello Flood Attack
3. Machine Learning Emerging as a Safeguard to Wsns
4. Supervised Learning
4.1. Linear Regression and Logistic Regression
4.2. Artificial Neural Networks (Ann)
4.3. Decision Tree
4.4. Random Forest
4.5. Bayesian Learning
4.6. Support Vector Machine (Svm)
4.7. K- Nearest Neighbor (K-Nn)
5. Unsupervised Learning
5.1. K- Means Clustering
5.2. Fuzzy C- Means Clustering
6. Semi-Supervised Learning
7. Reinforcement Learning
8. Machine Learning Addressing Issues in Wsns
8.1. Machine Learning Addressing Issue of Security
8.2. Machine Learning Addressing Issue of Routing in Wireless Sensor Network
8.3. Data Aggregation in Wsns with Machine Learning
9. Proposed Feature Selection Method and Comparative Analysis
  • Of Machine Learning Algorithms
9.1. Dataset Gathering
9.2. Feature Selection Methodology
9.2.1. Correlation-Based Feature
9.2.2. Info Gain Method
9.2.3. Cfs Subset Evaluation
10. Experimental Results and Analysis
  • Conclusion and Future Work
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 3 Iot- Fundamentals and Challenges
1. Introduction
2. History of IoT
2.1. Realizing the Concept
3. Internet of Things
3.1. Meaning of IoT
3.2. Importance of IoT
3.2.1. Things That Collect and Send Information
3.2.2. Things That Receive Information and Then Act on It
3.2.3. Things That Can Do Both
3.3. Scope of Iot: Applications and Examples
3.3.1. Increasing Efficiency
3.3.2. Improved Health and Safety
3.3.3. Enhancing Experience
4. Fundamentals of IoT
4.1. IoT Device Architecture
4.2. IoT Reference Architecture
4.3. IoT Standardization and Design Considerations
4.4. IoT Interoperability Challenges
4.5. IoT Device Architecture Network and Cloud
4.6. Centralized and Decentralized IoT Architectures
5. Challenges
5.1. Security
5.2. Customer Privacy
5.3. Scalability
6. Future
7. Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 4 IoT Based Energy Conservation of a Smart Home
1. Introduction
1.1. Background
1.2. Motivation
1.3. Organization of Chapter
2. Benefits of Smart Home
3. Smart Home & Energy Conservation
3.1. Glance at the Journey
3.2. Example: Smart Systems
3.2.1. Healthcare - Elderly Alert Systems
3.2.2. Home Energy Management System (Hems)
3.2.3. Smart Metering System (Sesame)
4. Architecture & Framework for Smart Home Environment
4.1. Data Flow and Management in Cms for Shes
5. Implementation of Smart Home Using Zigbee
5.1. Smart Home Control System
5.2. Two Major Functions
5.2.1. Framework Controlling Lights
5.2.2. Framework Controlling Fan
6. Conservation of Cultural Heritage-Application of Energy
  • Conservation IoT
  • Conclusion and Future Scope
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgements
  • References

Chapter 5 Blockchain: Concept and Emergence
1. Introduction
2. the Need for Blockchain Technology
3. History and Evolution
3.1. First Generation/ Blockchain 1.0
3.2. Second Generation/ Blockchain 2.0
3.3. Third Generation/ Blockchain 3.0
3.4. Fourth Generation/ Blockchain 4.0
4. Prefatory Elements
4.1. Transaction
4.2. Node
4.3. Mining
4.4. Block
4.5. Hashing
4.6. Digital Signatures
4.7. Consensus
4.8. Smart Contract
5. Features
5.1. Distributed
5.2. Decentralized
5.3. Immutable
5.4. Transparent
5.5. Peer to Peer Network
6. Types and Platforms
6.1. Public Blockchain
6.2. Private Blockchain
6.3. Consortium Blockchain
7. How Does It Work?
8. Applications, Advantages & Challenges
8.1. Applications
8.2. Advantages
8.3. Challenges
9. Future Scope
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgements
  • References

Chapter 6 Industrial Revolution: Blockchain as a Wave for Industry 4.0 and IIoT
1. Introduction
2. Background Materials
2.1. Industry 4.0
2.1.1. the First Revolution of Industry
2.1.2. the Second Revolution of Industry
2.1.3. the Third Revolution of Industry
2.1.4. the Fourth Revolution of Industry or Industry 4.0
2.2. IIoT
2.2.1. IIoT Versus IoT
3. Major Applications
3.1. Healthcare Industry
3.1.1. Patient Record Management
3.1.2. Securing Patient Data
3.1.3. Industrial Implementations
3.1.4. Challenges
3.2. Manufacturing Industry
3.2.1. Enhanced Data Protection
3.2.2. Manufacturing Plants
3.2.3. Developed Tracing as Well as Traceability
3.2.4. Credibility of Deliveries
3.2.5. Efficient Inventory Management
3.2.6. Challenges
3.3. Agriculture Industry
3.3.1. Production of Crop and Food
3.3.2. Preventing Weather Crisis
3.3.3. Food Supply Chain
3.3.4. Handling Agricultural Finance
3.3.5. Challenges
4. Open Issues and Modern Application Sectors
4.1. Open Challenges Related to Adoption of Blockchain Technology in IIoT
4.1.1. Energy and Cost Efficiency
4.1.2. Regulations
4.1.3. Resource Constraints
4.1.4. Security and Confidentiality
4.1.5. Scalability
4.2. Modern Application Fields in IIoT Where Blockchain is Being Implemented
4.2.1. Taxi Industry
4.2.2. Music Industry
4.2.3. Education Industry
4.2.4. Drone Industry
5. Challenges Implementation
5.1. Data Storage
5.2. Analytics Challenge
5.3. Connectivity Outage Challenge
5.4. Delivering Value to the Customer
5.5. Security
6. Solutions to Deal with Industrial IoT Implementation
  • Challenges
6.1. Clustering of IoT Gateway
6.2. Ttm, Tpm and Tnm
6.3. IIoT Gateway
6.4. Edge Computing
7. Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgements
  • References

Chapter 7 Enhancement of IoT Security Solutions Using Blockchain Technology
1. Introduction
1.1. Contribution of the Work
1.2. Paper Organization
2. Platforms to Implement Blockchain Technology and Its Uses
2.1. IoT and Its Integration
3. Techniques Used for Imposing Security
3.1. Consensus
3.2. Ledger
3.3. Cryptography
3.4. Hashing
3.5. Smart Contract
4. IoT Implementation
4.1. Data Storage in a Distributed Manner
4.2. Decentralized Energy Production and Consumption
4.3. Selective Offloading to Minimize the Data Path
4.4. IoT in Home Appliances

Author

  • Sudhir K. Sharma
  • Bharat Bhushan
  • Parma N. Astya
  • Narayan C. Debnath