Enabling Blockchain Technology for Secure Networking and Communications

Enabling Blockchain Technology for Secure Networking and Communications PDF Author: Ben Mnaouer, Adel
Publisher: IGI Global
ISBN: 1799858413
Category : Computers
Languages : en
Pages : 339

Get Book Here

Book Description
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Enabling Blockchain Technology for Secure Networking and Communications

Enabling Blockchain Technology for Secure Networking and Communications PDF Author: Ben Mnaouer, Adel
Publisher: IGI Global
ISBN: 1799858413
Category : Computers
Languages : en
Pages : 339

Get Book Here

Book Description
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Blockchain and AI Technology in the Industrial Internet of Things

Blockchain and AI Technology in the Industrial Internet of Things PDF Author: Pani, Subhendu Kumar
Publisher: IGI Global
ISBN: 1799866955
Category : Computers
Languages : en
Pages : 317

Get Book Here

Book Description
Blockchain and artificial intelligence (AI) in industrial internet of things is an emerging field of research at the intersection of information science, computer science, and electronics engineering. The radical digitization of industry coupled with the explosion of the internet of things (IoT) has set up a paradigm shift for industrial and manufacturing companies. There exists a need for a comprehensive collection of original research of the best performing methods and state-of-the-art approaches in this area of blockchain, AI, and the industrial internet of things in this new era for industrial and manufacturing companies. Blockchain and AI Technology in the Industrial Internet of Things compares different approaches to the industrial internet of things and explores the direct impact blockchain and AI technology have on the betterment of the human life. The chapters provide the latest advances in the field and provide insights and concerns on the concept and growth of the industrial internet of things. While including research on security and privacy, supply chain management systems, performance analysis, and a variety of industries, this book is ideal for professionals, researchers, managers, technologists, security analysts, executives, practitioners, researchers, academicians, and students looking for advanced research and information on the newest technologies, advances, and approaches for blockchain and AI in the industrial internet of things.

Revolutionary Applications of Blockchain-Enabled Privacy and Access Control

Revolutionary Applications of Blockchain-Enabled Privacy and Access Control PDF Author: Singh, Surjit
Publisher: IGI Global
ISBN: 1799875903
Category : Computers
Languages : en
Pages : 297

Get Book Here

Book Description
The security of an organizational information system with the invention of next-generation technologies is a prime focus these days. The industries and institutions in the field of computing and communication, especially in internet of things, cloud computing, mobile networks, next-generation networks, the energy market, banking sector, government sector, and many more, are primarily focused on these security and privacy issues. Blockchain is a new technology that has changed the scenario when it comes to addressing security concerns and resolving traditional safety issues. These industries have started developing applications based on the blockchain underlying platform to tap into this unlimited potential. Blockchain technologies have a great future, but there are still many challenges and issues to resolve for optimal design and utilization of the technology. Revolutionary Applications of Blockchain-Enabled Privacy and Access Control focuses on the recent challenges, design, and issues in the field of blockchain technologies-enabled privacy and advanced security practices in computing and communication. This book provides the latest research findings, solutions, and relevant theoretical frameworks in blockchain technologies, information security, and privacy in computing and communication. While highlighting the technology itself along with its applications and future outlook, this book is ideal for IT specialists, security analysts, cybersecurity professionals, researchers, academicians, students, scientists, and IT sector industry practitioners looking for research exposure and new ideas in the field of blockchain.

5G-Enabled Internet of Things

5G-Enabled Internet of Things PDF Author: Yulei Wu
Publisher: CRC Press
ISBN: 0429578393
Category : Computers
Languages : en
Pages : 419

Get Book Here

Book Description
How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, privacy and security, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, privacy and security, and emerging applications of 5G-eabled IoT.

Unmanned Aerial Vehicles for Internet of Things (IoT)

Unmanned Aerial Vehicles for Internet of Things (IoT) PDF Author: Vandana Mohindru
Publisher: John Wiley & Sons
ISBN: 1119768829
Category : Computers
Languages : en
Pages : 322

Get Book Here

Book Description
UNMANNED AERIAL VEHICLES FOR INTERNET OF THINGS This comprehensive book deeply discusses the theoretical and technical issues of unmanned aerial vehicles for deployment by industries and civil authorities in Internet of Things (IoT) systems. Unmanned aerial vehicles (UAVs) has become one of the rapidly growing areas of technology, with widespread applications covering various domains. UAVs play a very important role in delivering Internet of Things (IoT) services in small and low-power devices such as sensors, cameras, GPS receivers, etc. These devices are energy-constrained and are unable to communicate over long distances. The UAVs work dynamically for IoT applications in which they collect data and transmit it to other devices that are out of communication range. Furthermore, the benefits of the UAV include deployment at remote locations, the ability to carry flexible payloads, reprogrammability during tasks, and the ability to sense for anything from anywhere. Using IoT technologies, a UAV may be observed as a terminal device connected with the ubiquitous network, where many other UAVs are communicating, navigating, controlling, and surveilling in real time and beyond line-of-sight. The aim of the 15 chapters in this book help to realize the full potential of UAVs for the IoT by addressing its numerous concepts, issues and challenges, and develops conceptual and technological solutions for handling them. Applications include such fields as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. In addition, the book covers: Efficient energy management systems in UAV-based IoT networks IoE enabled UAVs Mind-controlled UAV using Brain-Computer Interface (BCI) The importance of AI in realizing autonomous and intelligent flying IoT Blockchain-based solutions for various security issues in UAV-enabled IoT The challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety. Audience: Researchers in computer science, Internet of Things (IoT), electronics engineering, as well as industries that use and deploy drones and other unmanned aerial vehicles.

Research Anthology on Securing Medical Systems and Records

Research Anthology on Securing Medical Systems and Records PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668463121
Category : Computers
Languages : en
Pages : 1060

Get Book Here

Book Description
With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technologies for the storage and access of health data as well as the monitoring of patient health. Telehealth was particularly useful during the COVID-19 pandemic, which monumentally increased its everyday usage. However, this transition of health data has increased privacy risks, and cyber criminals and hackers may have increased access to patient personal data. Medical staff and administrations must remain up to date on the new technologies and methods in securing these medical systems and records. The Research Anthology on Securing Medical Systems and Records discusses the emerging challenges in healthcare privacy as well as the technologies, methodologies, and emerging research in securing medical systems and enhancing patient privacy. It provides information on the implementation of these technologies as well as new avenues of medical security research. Covering topics such as biomedical imaging, internet of things, and watermarking, this major reference work is a comprehensive resource for security analysts, data scientists, hospital administrators, leaders in healthcare, medical professionals, health information managers, medical professionals, mobile application developers, security professionals, technicians, students, libraries, researchers, and academicians.

Handbook of Research on Advancing Cybersecurity for Digital Transformation

Handbook of Research on Advancing Cybersecurity for Digital Transformation PDF Author: Sandhu, Kamaljeet
Publisher: IGI Global
ISBN: 1799869768
Category : Computers
Languages : en
Pages : 460

Get Book Here

Book Description
Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have left. Cybersecurity for computer systems has increasingly become important because the government, military, corporate, financial, critical infrastructure, and medical organizations rely heavily on digital network systems, which process and store large volumes of data on computer devices that are exchanged on the internet, and they are vulnerable to “continuous” cyberattacks. As cybersecurity has become a global concern, it needs to be clearly understood, and innovative solutions are required. The Handbook of Research on Advancing Cybersecurity for Digital Transformation looks deeper into issues, problems, and innovative solutions and strategies that are linked to cybersecurity. This book will provide important knowledge that can impact the improvement of cybersecurity, which can add value in terms of innovation to solving cybersecurity threats. The chapters cover cybersecurity challenges, technologies, and solutions in the context of different industries and different types of threats. This book is ideal for cybersecurity researchers, professionals, scientists, scholars, and managers, as well as practitioners, stakeholders, researchers, academicians, and students interested in the latest advancements in cybersecurity for digital transformation.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things

Achieving Full Realization and Mitigating the Challenges of the Internet of Things PDF Author: Odhiambo, Marcel Ohanga
Publisher: IGI Global
ISBN: 1799893138
Category : Computers
Languages : en
Pages : 263

Get Book Here

Book Description
As the internet of things market is booming, several issues are delaying the full realization of the technology. Currently, business competitors are jockeying for a piece of the market, meaning solutions from researchers that address these issues is crucial for internet of things technology developers. Overpromising followed by underdelivering has been the current approach by many innovators, and the mismatch results in losses in production, orphaned technologies, and frequent system failures. Solutions that address internet of things performance issues must be studied in order to take full advantage of this emerging market. Achieving Full Realization and Mitigating the Challenges of the Internet of Things addresses the challenges faced in rolling out internet of things technologies as well as the various performance issues. Covering a range of topics such as cybersecurity and connectivity issues, this reference work is ideal for industry professionals, academicians, researchers, practitioners, technology developers, instructors, and students.

Intersections of Law and Computational Intelligence in Health Governance

Intersections of Law and Computational Intelligence in Health Governance PDF Author: Vig, Komal
Publisher: IGI Global
ISBN:
Category : Law
Languages : en
Pages : 444

Get Book Here

Book Description
Intelligent technologies have vastly improved the efficiency of healthcare industries and intersections of law and governance. Computational intelligence provides effective tools for data management, contract analysis, legal research, and algorithm development. However, with the integration of computational intelligence in health governance, considerable legal concerns beg further exploration. Intersections of Law and Computational Intelligence in Health Governance examines computational intelligence related to healthcare and governance approaches. It addresses issues of healthcare data analysis and storage by presenting solutions using medical computational intelligence techniques. This book covers topics such as healthcare accessibility, medical law, deep learning, and drug discovery and classification, and is a valuable resource for lawyers, policy makers, healthcare workers, medical professionals, academicians, and researchers.

Fraud and Risk in Commercial Law

Fraud and Risk in Commercial Law PDF Author: Paul S Davies
Publisher: Bloomsbury Publishing
ISBN: 1509970762
Category : Law
Languages : en
Pages : 406

Get Book Here

Book Description
This book focuses on contemporary problems related to fraud and risk in commercial law. It has been said by some that we are in a 'golden age of fraud'. In part this has been caused by globalisation, technological changes and the financialisation of business. This has resulted in the creation of automated linkages with integrated supply chains and the creation of systemic risks, which have been exacerbated by new forms of intangible assets like tokens and their ease of movement. While regulation has ebbed and flowed given the desire of governments to generate economic growth, as well as the distrust of their coercive powers, the courts have sought to strike a balance between considerations such as commercial certainty and fairness. The book provides an analysis of key contemporary issues on the theme of fraud and risk in commercial law, including: technology and fraud, secondary liability and 'failure to prevent' economic crime, abuse of business entities, insolvency and creditor protection, injunctions and other orders, cross-border issues, the relationship between regulation and private law, and solutions for policy makers.