Low-Power Wide-Area Networks: Opportunities, Challenges, Risks and Threats


Book Description

This book offers the most suitable methods of applying Low-Power Wide-Area Network (LPWAN) technology to conceptual works and/or research studies. For instance, existing IoT protocols such as CoAP and MQTT are complemented by LPWAN to provide better service quality (QoS) to enable the notion of "sensor as a service" to endpoint users which is demonstrated in this book. LPWAN is a new enabling technology for IoT, filling the gap that existed between the legacy network technologies (WLAN, LAN, PAN) in terms of power, range, and data rates. It is also an alternative solution to implementations of IoT via cellular (4G/5G/6G) technologies, as it operates on the ISM band and also provides long-term battery life. Due to the several advantages, it brings, LPWAN raises high enthusiasm for many stakeholders of IoT. However, there still exist many research challenges to be tackled within this technology. As such this book aims at shedding light on those research problems. Moreover, practical users can also benefit from this book: Emergency response teams can leverage IoT systems with the extended communications-range capability provided by LPWAN technology. Moreover, machine-to-machine (M2M) and thing-to-thing (T2T) communications also benefit from this notion, as well as the Social IoT (SIoT) concept, owing to the “low-power” consumption advantage that is brought up by LPWAN technologies, e.g., 10 years battery lifetime projection for the LoRaWAN end-devices is very promising. Eventually, this proposed book aims at covering all aspects of LPWANs, from A to Z, theoretical aspects, hardware platforms and technologies, along with applications, opportunities, and, finally, challenges. Cyber-attacks and incidences are on the rise within the last decade, especially cases in large corporates and critical infrastructures have shown that cybersecurity should become one of the important pillars of computer network infrastructures as well as any kind of relevant technology being introduced. As such, cybersecurity is bringing attention not only from practitioners and academicians but also from other parties such as media, politicians, etc. Eventually, to reflect this important point of view, this book includes three chapters to investigate various aspects of LPWAN cybersecurity. Researchers working in wireless communications technologies and advanced-level students taking courses in electrical engineering or computer science will benefit from this book as a reference. Professionals working within this related field will also want to purchase this book.




LPWAN Technologies for IoT and M2M Applications


Book Description

Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. The LPWANs are resource-constrained networks and have critical requirements for long battery life, extended coverage, high scalability, and low device and deployment costs. There are several design and deployment challenges such as media access control, spectrum management, link optimization and adaptability, energy harvesting, duty cycle restrictions, coexistence and interference, interoperability and heterogeneity, security and privacy, and others.LPWAN Technologies for IoT and M2M Applications is intended to provide a one-stop solution for study of LPWAN technologies as it covers a broad range of topics and multidisciplinary aspects of LPWAN and IoT. Primarily, the book focuses on design requirements and constraints, channel access, spectrum management, coexistence and interference issues, energy efficiency, technology candidates, use cases of different applications in smart city, healthcare, and transportation systems, security issues, hardware/software platforms, challenges, and future directions.




Internet of Things: Novel Advances and Envisioned Applications


Book Description

This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society.




Meta-Heuristic Algorithms for Advanced Distributed Systems


Book Description

META-HEURISTIC ALGORITHMS FOR ADVANCED DISTRIBUTED SYSTEMS Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic techniques are increasingly gaining favor as tools for optimizing distributed systems—generally, to enhance the utility and precision of database searches. Carefully applied, they can increase system effectiveness, streamline operations, and reduce cost. Since many of these techniques are derived from nature, they offer considerable scope for research and development, with the result that this field is growing rapidly. Meta-Heuristic Algorithms for Advanced Distributed Systems offers an overview of these techniques and their applications in various distributed systems. With strategies based on both global and local searching, it covers a wide range of key topics related to meta-heuristic algorithms. Those interested in the latest developments in distributed systems will find this book indispensable. Meta-Heuristic Algorithms for Advanced Distributed Systems readers will also find: Analysis of security issues, distributed system design, stochastic optimization techniques, and more Detailed discussion of meta-heuristic techniques such as the genetic algorithm, particle swam optimization, and many others Applications of optimized distribution systems in healthcare and other key??industries Meta-Heuristic Algorithms for Advanced Distributed Systems is ideal for academics and researchers studying distributed systems, their design, and their applications.




Internet of Things for Smart Cities


Book Description

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security.




Blockchain for Cybersecurity and Privacy


Book Description

Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about blockchain technology applications for cybersecurity and privacy. This book focuses on the fundamentals, architectures, and challenges of adopting blockchain for cybersecurity. Readers will discover different applications of blockchain for cybersecurity in IoT and healthcare. The book also includes some case studies of the blockchain for e-commerce online payment, retention payment system, and digital forensics. The book offers comprehensive coverage of the most essential topics, including: Blockchain architectures and challenges Blockchain threats and vulnerabilities Blockchain security and potential future use cases Blockchain for securing Internet of Things Blockchain for cybersecurity in healthcare Blockchain in facilitating payment system security and privacy This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in the fields of blockchain technology and cybersecurity. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on the blockchain for cybersecurity and privacy.







The Internet of Things in the Industrial Sector


Book Description

This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.




Intelligent Systems, Technologies and Applications


Book Description

This book offers to readers a selection of refereed papers that were presented at the Sixth International Symposium on Intelligent Systems Technologies and Applications (ISTA’20). All submissions were evaluated on the basis of their significance, novelty, and technical quality. This book consists of 28 papers (19 regular and 9 short papers) that were virtually presented at the Symposium. The papers cover different areas such as big data analytics, security and privacy, Internet of things, machine and deep learning, health informatics, visual computing, signal processing, and natural language processing. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.




Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021)


Book Description

This book presents the 2nd International Conference on Artificial Intelligence and Computer Visions (AICV 2021) proceeding, which took place in Settat, Morocco, from June 28- to 30, 2021. AICV 2021 is organized by the Scientific Research Group in Egypt (SRGE) and the Computer, Networks, Mobility and Modeling Laboratory (IR2M), Hassan 1st University, Faculty of Sciences Techniques, Settat, Morocco. This international conference highlighted essential research and developments in the fields of artificial intelligence and computer visions. The book is divided into sections, covering the following topics: Deep Learning and Applications; Smart Grid, Internet of Things, and Mobil Applications; Machine Learning and Metaheuristics Optimization; Business Intelligence and Applications; Machine Vision, Robotics, and Speech Recognition; Advanced Machine Learning Technologies; Big Data, Digital Transformation, AI and Network Analysis; Cybersecurity; Feature Selection, Classification, and Applications.