Coverart for item
The Resource Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam

Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam

Label
Recent trends and advances in wireless and IoT-enabled networks
Title
Recent trends and advances in wireless and IoT-enabled networks
Statement of responsibility
editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Contributor
Editor
Subject
Language
eng
Member of
Cataloging source
N$T
Dewey number
621.384
Index
index present
LC call number
TK5103.2
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Jan, Mian Ahmad
  • Khan, Fazlullah
  • Alam, Muhammad
Series statement
EAI/Springer innovations in communication and computing,
http://library.link/vocab/subjectName
  • Wireless communication systems
  • Internet of things
Label
Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 1 A Distributed Trust Management Model for the Internet of Things (DTM-IoT); 1.1 Introduction; 1.2 The DTM-IoT Structural Design; 1.3 The DTM-IoT Mechanisms; 1.3.1 The Cluster Node (CN) Components; 1.3.2 The Master Node (MN) Components; 1.3.3 The Cluster Components; 1.4 Conclusion and Future Work; References; 2 A Review of Current Security Issues in Internet of Things; 2.1 Introduction; 2.2 Evolution of Internet of Things; 2.3 Generic Architecture of Internet of Things; 2.3.1 Perception Layer; 2.3.2 Network Layer; 2.3.3 Application Layer
  • 2.4 IOT Protocols2.5 Security Issues; 2.5.1 Confidentiality; 2.5.2 Heterogeneity; 2.5.3 Integrity; 2.5.4 Lightweight Solutions; 2.5.5 Authentication; 2.5.6 Availability; 2.6 Security Issues in Each Layer of IOT; 2.6.1 Perception Layer; 2.6.2 Network Layer; 2.6.3 Application Layer; 2.7 Countermeasures for IoT Security; 2.7.1 Authentication Measures; 2.7.1.1 Digital Certificate; 2.7.1.2 Trust Establishment; 2.7.1.3 Security Awareness; 2.8 Conclusion; References; 3 A Review of Internet of Things (IoT) Connectivity Techniques; 3.1 Introduction; 3.2 Description of IoT Technologies
  • 3.2.1 Traditional Cellular Networks3.3 Connectivity Technologies with Respect to IoT Launch; 3.4 IoT Connectivity Technologies; 3.5 Considerations in Choosing the Right IoT Connectivity Technologies; 3.6 Assessment of IoT Technologies; 3.7 Challenges of IoT Connectivity; 3.8 Conclusion; References; 4 An Evolutionary Game-Based Mechanism for Unwanted Traffic Control; 4.1 Introduction; 4.2 System Model; 4.2.1 Incentive Mechanism Model; 4.2.2 Economic Model; 4.2.3 Assumptions; 4.3 Public-Goods-Based Evolution Game; 4.3.1 Hosts Utility and Strategy
  • 4.3.1.1 Two-Strategy Evolutionary Game Without Incentive Mechanism4.3.1.2 Three-Strategy Evolutionary Game Without Incentive Mechanism; 4.3.1.3 Three-Strategy Evolutionary Game with Punishment; 4.3.1.4 Three-Strategy Evolutionary Game with Punishment and Rewarding; 4.3.2 ISP Utility and Strategy; 4.4 Evolution Analysis; 4.4.1 Evolutionary Analysis Under CBLM; 4.4.2 Impact of m1 and m2; 4.5 Performance Evaluation; 4.6 Conclusion; References; 5 Usability Attributes for Mobile Applications: A SystematicReview; 5.1 Introduction; 5.2 The Systematic Review; 5.3 Results; 5.4 Results Evaluation
  • 5.5 ConclusionReferences; 6 A Review on Integration of Scientific Experimental Data Through Metadata; 6.1 Introduction; 6.2 Metadata Approach; 6.2.1 Metadata Building Blocks; 6.2.2 Metadata Standards; 6.3 Related Work; 6.4 Metadata for Scientific Experimental Data Integration; 6.4.1 Existing Metadata Approach for Scientific Experiment Data; 6.5 Summary and Conclusion; References; 7 Passive RFID Localization in the Internet of Things; 7.1 Introduction; 7.2 Localization in Smart Homes; 7.2.1 Accuracy; 7.2.2 RFID Localization Systems; 7.3 Limitations in Localization Systems Using RFID Tags
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783319999654
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1083205251
  • (OCoLC)1083205251
Label
Recent trends and advances in wireless and IoT-enabled networks, editors, Mian Ahmad Jan, Fazlullah Khan and Muhammad Alam
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 1 A Distributed Trust Management Model for the Internet of Things (DTM-IoT); 1.1 Introduction; 1.2 The DTM-IoT Structural Design; 1.3 The DTM-IoT Mechanisms; 1.3.1 The Cluster Node (CN) Components; 1.3.2 The Master Node (MN) Components; 1.3.3 The Cluster Components; 1.4 Conclusion and Future Work; References; 2 A Review of Current Security Issues in Internet of Things; 2.1 Introduction; 2.2 Evolution of Internet of Things; 2.3 Generic Architecture of Internet of Things; 2.3.1 Perception Layer; 2.3.2 Network Layer; 2.3.3 Application Layer
  • 2.4 IOT Protocols2.5 Security Issues; 2.5.1 Confidentiality; 2.5.2 Heterogeneity; 2.5.3 Integrity; 2.5.4 Lightweight Solutions; 2.5.5 Authentication; 2.5.6 Availability; 2.6 Security Issues in Each Layer of IOT; 2.6.1 Perception Layer; 2.6.2 Network Layer; 2.6.3 Application Layer; 2.7 Countermeasures for IoT Security; 2.7.1 Authentication Measures; 2.7.1.1 Digital Certificate; 2.7.1.2 Trust Establishment; 2.7.1.3 Security Awareness; 2.8 Conclusion; References; 3 A Review of Internet of Things (IoT) Connectivity Techniques; 3.1 Introduction; 3.2 Description of IoT Technologies
  • 3.2.1 Traditional Cellular Networks3.3 Connectivity Technologies with Respect to IoT Launch; 3.4 IoT Connectivity Technologies; 3.5 Considerations in Choosing the Right IoT Connectivity Technologies; 3.6 Assessment of IoT Technologies; 3.7 Challenges of IoT Connectivity; 3.8 Conclusion; References; 4 An Evolutionary Game-Based Mechanism for Unwanted Traffic Control; 4.1 Introduction; 4.2 System Model; 4.2.1 Incentive Mechanism Model; 4.2.2 Economic Model; 4.2.3 Assumptions; 4.3 Public-Goods-Based Evolution Game; 4.3.1 Hosts Utility and Strategy
  • 4.3.1.1 Two-Strategy Evolutionary Game Without Incentive Mechanism4.3.1.2 Three-Strategy Evolutionary Game Without Incentive Mechanism; 4.3.1.3 Three-Strategy Evolutionary Game with Punishment; 4.3.1.4 Three-Strategy Evolutionary Game with Punishment and Rewarding; 4.3.2 ISP Utility and Strategy; 4.4 Evolution Analysis; 4.4.1 Evolutionary Analysis Under CBLM; 4.4.2 Impact of m1 and m2; 4.5 Performance Evaluation; 4.6 Conclusion; References; 5 Usability Attributes for Mobile Applications: A SystematicReview; 5.1 Introduction; 5.2 The Systematic Review; 5.3 Results; 5.4 Results Evaluation
  • 5.5 ConclusionReferences; 6 A Review on Integration of Scientific Experimental Data Through Metadata; 6.1 Introduction; 6.2 Metadata Approach; 6.2.1 Metadata Building Blocks; 6.2.2 Metadata Standards; 6.3 Related Work; 6.4 Metadata for Scientific Experimental Data Integration; 6.4.1 Existing Metadata Approach for Scientific Experiment Data; 6.5 Summary and Conclusion; References; 7 Passive RFID Localization in the Internet of Things; 7.1 Introduction; 7.2 Localization in Smart Homes; 7.2.1 Accuracy; 7.2.2 RFID Localization Systems; 7.3 Limitations in Localization Systems Using RFID Tags
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783319999654
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1083205251
  • (OCoLC)1083205251

Library Locations

Processing Feedback ...