Coverart for item
The Resource Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam

Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam

Label
Recent trends and advances in wireless and IoT-enabled networks
Title
Recent trends and advances in wireless and IoT-enabled networks
Statement of responsibility
editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Contributor
Subject
Language
eng
Member of
Dewey number
621.384
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Jan, Mian Ahmad,
  • Khan, Fazlullah,
  • Alam, Muhammad,
Series statement
EAI/Springer innovations in communication and computing,
http://library.link/vocab/subjectName
  • Wireless communication systems
  • Internet of things
Label
Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 1 A Distributed Trust Management Model for the Internet of Things (DTM-IoT); 1.1 Introduction; 1.2 The DTM-IoT Structural Design; 1.3 The DTM-IoT Mechanisms; 1.3.1 The Cluster Node (CN) Components; 1.3.2 The Master Node (MN) Components; 1.3.3 The Cluster Components; 1.4 Conclusion and Future Work; References; 2 A Review of Current Security Issues in Internet of Things; 2.1 Introduction; 2.2 Evolution of Internet of Things; 2.3 Generic Architecture of Internet of Things; 2.3.1 Perception Layer; 2.3.2 Network Layer; 2.3.3 Application Layer
  • 2.4 IOT Protocols2.5 Security Issues; 2.5.1 Confidentiality; 2.5.2 Heterogeneity; 2.5.3 Integrity; 2.5.4 Lightweight Solutions; 2.5.5 Authentication; 2.5.6 Availability; 2.6 Security Issues in Each Layer of IOT; 2.6.1 Perception Layer; 2.6.2 Network Layer; 2.6.3 Application Layer; 2.7 Countermeasures for IoT Security; 2.7.1 Authentication Measures; 2.7.1.1 Digital Certificate; 2.7.1.2 Trust Establishment; 2.7.1.3 Security Awareness; 2.8 Conclusion; References; 3 A Review of Internet of Things (IoT) Connectivity Techniques; 3.1 Introduction; 3.2 Description of IoT Technologies
  • 3.2.1 Traditional Cellular Networks3.3 Connectivity Technologies with Respect to IoT Launch; 3.4 IoT Connectivity Technologies; 3.5 Considerations in Choosing the Right IoT Connectivity Technologies; 3.6 Assessment of IoT Technologies; 3.7 Challenges of IoT Connectivity; 3.8 Conclusion; References; 4 An Evolutionary Game-Based Mechanism for Unwanted Traffic Control; 4.1 Introduction; 4.2 System Model; 4.2.1 Incentive Mechanism Model; 4.2.2 Economic Model; 4.2.3 Assumptions; 4.3 Public-Goods-Based Evolution Game; 4.3.1 Hosts Utility and Strategy
  • 4.3.1.1 Two-Strategy Evolutionary Game Without Incentive Mechanism4.3.1.2 Three-Strategy Evolutionary Game Without Incentive Mechanism; 4.3.1.3 Three-Strategy Evolutionary Game with Punishment; 4.3.1.4 Three-Strategy Evolutionary Game with Punishment and Rewarding; 4.3.2 ISP Utility and Strategy; 4.4 Evolution Analysis; 4.4.1 Evolutionary Analysis Under CBLM; 4.4.2 Impact of m1 and m2; 4.5 Performance Evaluation; 4.6 Conclusion; References; 5 Usability Attributes for Mobile Applications: A SystematicReview; 5.1 Introduction; 5.2 The Systematic Review; 5.3 Results; 5.4 Results Evaluation
  • 5.5 ConclusionReferences; 6 A Review on Integration of Scientific Experimental Data Through Metadata; 6.1 Introduction; 6.2 Metadata Approach; 6.2.1 Metadata Building Blocks; 6.2.2 Metadata Standards; 6.3 Related Work; 6.4 Metadata for Scientific Experimental Data Integration; 6.4.1 Existing Metadata Approach for Scientific Experiment Data; 6.5 Summary and Conclusion; References; 7 Passive RFID Localization in the Internet of Things; 7.1 Introduction; 7.2 Localization in Smart Homes; 7.2.1 Accuracy; 7.2.2 RFID Localization Systems; 7.3 Limitations in Localization Systems Using RFID Tags
Control code
on1083205251
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9783319999661
Level of compression
unknown
Note
SpringerLink
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1083205251
Label
Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 1 A Distributed Trust Management Model for the Internet of Things (DTM-IoT); 1.1 Introduction; 1.2 The DTM-IoT Structural Design; 1.3 The DTM-IoT Mechanisms; 1.3.1 The Cluster Node (CN) Components; 1.3.2 The Master Node (MN) Components; 1.3.3 The Cluster Components; 1.4 Conclusion and Future Work; References; 2 A Review of Current Security Issues in Internet of Things; 2.1 Introduction; 2.2 Evolution of Internet of Things; 2.3 Generic Architecture of Internet of Things; 2.3.1 Perception Layer; 2.3.2 Network Layer; 2.3.3 Application Layer
  • 2.4 IOT Protocols2.5 Security Issues; 2.5.1 Confidentiality; 2.5.2 Heterogeneity; 2.5.3 Integrity; 2.5.4 Lightweight Solutions; 2.5.5 Authentication; 2.5.6 Availability; 2.6 Security Issues in Each Layer of IOT; 2.6.1 Perception Layer; 2.6.2 Network Layer; 2.6.3 Application Layer; 2.7 Countermeasures for IoT Security; 2.7.1 Authentication Measures; 2.7.1.1 Digital Certificate; 2.7.1.2 Trust Establishment; 2.7.1.3 Security Awareness; 2.8 Conclusion; References; 3 A Review of Internet of Things (IoT) Connectivity Techniques; 3.1 Introduction; 3.2 Description of IoT Technologies
  • 3.2.1 Traditional Cellular Networks3.3 Connectivity Technologies with Respect to IoT Launch; 3.4 IoT Connectivity Technologies; 3.5 Considerations in Choosing the Right IoT Connectivity Technologies; 3.6 Assessment of IoT Technologies; 3.7 Challenges of IoT Connectivity; 3.8 Conclusion; References; 4 An Evolutionary Game-Based Mechanism for Unwanted Traffic Control; 4.1 Introduction; 4.2 System Model; 4.2.1 Incentive Mechanism Model; 4.2.2 Economic Model; 4.2.3 Assumptions; 4.3 Public-Goods-Based Evolution Game; 4.3.1 Hosts Utility and Strategy
  • 4.3.1.1 Two-Strategy Evolutionary Game Without Incentive Mechanism4.3.1.2 Three-Strategy Evolutionary Game Without Incentive Mechanism; 4.3.1.3 Three-Strategy Evolutionary Game with Punishment; 4.3.1.4 Three-Strategy Evolutionary Game with Punishment and Rewarding; 4.3.2 ISP Utility and Strategy; 4.4 Evolution Analysis; 4.4.1 Evolutionary Analysis Under CBLM; 4.4.2 Impact of m1 and m2; 4.5 Performance Evaluation; 4.6 Conclusion; References; 5 Usability Attributes for Mobile Applications: A SystematicReview; 5.1 Introduction; 5.2 The Systematic Review; 5.3 Results; 5.4 Results Evaluation
  • 5.5 ConclusionReferences; 6 A Review on Integration of Scientific Experimental Data Through Metadata; 6.1 Introduction; 6.2 Metadata Approach; 6.2.1 Metadata Building Blocks; 6.2.2 Metadata Standards; 6.3 Related Work; 6.4 Metadata for Scientific Experimental Data Integration; 6.4.1 Existing Metadata Approach for Scientific Experiment Data; 6.5 Summary and Conclusion; References; 7 Passive RFID Localization in the Internet of Things; 7.1 Introduction; 7.2 Localization in Smart Homes; 7.2.1 Accuracy; 7.2.2 RFID Localization Systems; 7.3 Limitations in Localization Systems Using RFID Tags
Control code
on1083205251
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9783319999661
Level of compression
unknown
Note
SpringerLink
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)1083205251

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...