EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.
Les mer
List of Figures xv List of Tables xix Foreword xxi Preface xxiii Acknowledgments xxv Acronyms xxvii 1 5G Technologies, Architecture and Protocols 1 Shweta Bondre, Ashish Sharma, Vipin Bondre 1.1 Evolution of Wireless Technologies 2 1.2 5G Cellular Network Architecture 4 1.2.1 5G E2E Network Architecture 6 1.2.2 Network Slicing Architecture 6 1.2.3 NFV Management and Orchestration 7 1.2.4 NGMN Envisioned 5G Design 9 1.3 5G Energy Efficiency 10 1.3.1 Full Duplex 10 1.3.2 High Network Data Rate 11 1.3.3 Dense Small Cell Deployment 11 1.3.4 Massive MIMO Antennas 11 1.4 Security in 5G 12 1.5 5G Applications 13 1.5.1 Rapid Data Transmission 13 1.5.2 5G Flexibility for Smart Mobility 13 1.5.3 5G in Smart Cities 14 1.5.4 5G Augmented Reality 14 1.6 Conclusion 14 References 15 2 Scope and Challenges of IoT and Blockchain Integration 21 Sara Shree, Monika Sharma 2.1 Introduction 22 2.2 Literature Review 22 2.3 Internet of Things and Its Centralized System 23 2.3.1 Application Layer 24 2.3.2 Network Layer 24 2.3.3 Device Layer 25 2.4 Blockchain Technology 25 2.4.1 Characteristics of Blockchain 25 2.4.2 Working Mechanisms of Blockchain 26 2.4.3 Example of Blockchain Transactions 27 2.4.4 Need for Blockchain Technology 27 2.5 Integration of Blockchain and IoT Technology 28 2.5.1 Interactions of IoT and Blockchain Integrations 29 2.5.2 Blockchain Platforms for IoT 30 2.5.3 Advantages of Integrating IoT with Blockchain 31 2.5.4 Challenges of Blockchain and IoT Integration 33 2.5.5 Applications of IoT-Blockchain Integration 34 2.6 Conclusion 36 References 37 3 Data Communication and Information Exchange in Distributed IoT Environment 41 Rachna Jain, Kanta Prasad Sharma, Rana Majumdar, Dac-Nhuong Le 3.1 Introduction 42 3.2 IoT Technologies and Their Uses 43 3.2.1 How WSN Works 43 3.2.2 Communication with RIFD-Enabled Devices 43 3.2.3 WWW - Things on the Web 44 3.3 Centralized vs. Distributed Approach 44 3.3.1 Centralized System and Its Physiognomies 45 3.3.2 Advantages 45 3.3.3 Disadvantages of Centralized System 45 3.4 Distributed System Architecture 46 3.4.1 Advantages of Distributed System Architecture 46 3.4.2 Drawbacks of Distributed System Architecture 47 3.5 Data Communication Taking Place in Distributed IoT Environment 48 3.5.1 Internet of Things (IoT) Protocol 48 3.5.2 Constrained Application Protocol (CoAP) 48 3.5.3 Message Queuing Telemetry Transport (MQTT) 48 3.5.4 Wi-Fi 49 3.5.5 Zigbee 49 3.5.6 Extensible Messaging and Presence Protocol (XMPP) 49 3.5.7 Data Distribution Service (DDS) 49 3.5.8 Advanced Message Queuing Protocol (AMQP) 49 3.5.9 Smart Home and IoT Applications: An Example 50 3.5.10 IoT Services, Machines and Applications 50 3.5.11 Sensor-Based IoT Services 50 3.5.12 Application in IoT Environment 50 3.5.13 Future of IoT in a COVID-19 Pandemic 51 3.6 Conclusion 51 References 52 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction 55 Neeraj Kumar Pandey, Sampoorna Kashyap, Ashish Sharma, Manoj Diwakar 4.1 Introduction 56 4.2 Cloud-Based Solutions 59 4.2.1 Information and Communications Technology 59 4.2.2 Artificial Intelligence and Machine Learning 59 4.2.3 Data Analytics and Business Intelligence 62 4.3 Impact of Industry 4.0 in the Cloud Computing Industry 63 4.3.1 Agriculture and Forestry 64 4.3.2 Entertainment, Media, and Hospitality 65 4.3.3 Robotics and Automation, Manufacturing and Maintenance 65 4.4 Significance and Impact of Cloud in the Pandemic Outbreak 66 4.5 Conclusion and Future Directions 66 References 67 5 Network Security in Evolving Networking Technologies: Developments and Future Directions 75 Uma Yadav, Ashish Sharma 5.1 Introduction 76 5.2 Background on Attacks, Security Services and Challenges 77 5.2.1 Types of Attacks Possible on Network 77 5.2.2 Security Services 79 5.2.3 Challenges 80 5.3 Evolution of Network Security Strategies 81 5.4 Different Evolving Security Approaches 82 5.4.1 Conventional Approaches 83 5.4.2 Confidentiality Approaches 84 5.4.3 Privacy Approaches 86 5.4.4 Availability Approaches 87 5.4.5 Modern Approaches 88 5.5 Discussion 91 5.6 Conclusion 92 References 92 6 The State of CDNs Today and What AI-Assisted CDN Means for the Future 97 Darothi Sarkar, Rana Majumdar, Dac-Nhuong Le 6.1 Introduction 98 6.2 CDN and Its Challenges 99 6.2.1 Replica Server Placement 99 6.2.2 Content Replication 100 6.2.3 Request Routing 101 6.2.4 Load Balancing 102 6.3 Importance of AI in CDN 103 6.4 Pandemic and CDN 104 6.5 Security Threats in CDN 105 6.6 Conclusion 106 References 107 7 Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing 111 Jayden Pires, Vinod Kumar Shukla, Leena Wanganoo, Sonali Vyas 7.1 Introduction 112 7.2 Literature Review 112 7.2.1 Smart City and Network Management 113 7.2.2 Blockchain and Network 116 7.3 Blockchain and Smart City 118 7.3.1 Smart Healthcare 118 7.3.2 Smart E-Voting 118 7.3.3 Smart Logistics and Supply Chains 119 7.4 Cloud Computing and Challenges 119 7.4.1 Cloud Computing 119 7.5 Research Methodology 122 7.6 Conclusion 124 References 125 8 Role of IoT in Smart Homes and Offices 129 Shaurya Gupta, Sonali Vyas, Kanta Prasad Sharma 8.1 Introduction 130 8.2 Smart Building Constituents 130 8.3 Concept of Smart Office Service Devices 132 8.4 IoT in Smart Homes and Offices 133 8.4.1 Smart Environment Models 135 8.4.2 IoT Control Systems for Smart Home Devices 136 8.4.3 Prevailing Designs in Smart Homes 138 8.4.4 Smart Home Constituents 139 8.4.5 Cloud Topological Structure 140 8.4.6 Smart Home-Based Cloud Architectural Design 140 8.5 Future Research Directions and Limitations of Smart Home-Based Technology 141 8.6 Conclusion 141 References 141 9 Role of IoT in the Prevention of COVID- 19 145 Ankit Saxena, Akash Sanghi, Swapnesh Taterh, Neeraj Bhargava 9.1 Introduction 146 9.2 A Modern Era Problem 146 9.2.1 Current Risk 147 9.2.2 Awareness by Social Media 149 9.2.3 Review of Current Solutions 151 9.2.4 Current Treatment 151 9.3 Technology 152 9.3.1 Touchless User Interface 152 9.3.2 IR Sensor Working Principle 152 9.4 IoT Sensors and Board 154 9.4.1 Arduino UNO Board 154 9.4.2 Arduino USB Cable 155 9.4.3 Pulse Rate Sensor 155 9.4.4 IR Sensor 156 9.4.5 Temperature Sensors 157 9.4.6 Proximity Sensors 157 9.4.7 Pressure Sensors 157 9.4.8 LCD Display 158 9.4.9 Relay 158 9.4.10 Power Supply 159 9.4.11 Jumping Wires 159 9.5 Use of IoT in COVID-19 Prevention 160 9.6 Conclusion 161 References 162 10 Role of Satellites in Agriculture 165 Prashant Johri, Kanta Prasad Sharma, Aadrit Chauhan, Sunilkkhatri 10.1 Introduction 166 10.2 Processing Satellite Images 167 10.3 Product Levels of Satellite Remote Sensing Data 168 10.3.1 A Brief Discussion and Review of Analysis Techniques 168 10.3.2 Machine Learning 169 10.3.3 Deep Learning 170 10.4 Future Challenges 173 10.5 Conclusion 174 References 174 11 Search Engine Evaluation Methodology 177 JN Singh, Prashant Johri, Gaurav Dhuriya, Kanta Prasad Sharma 11.1 Introduction 178 11.2 Performance Evaluation Forum 178 11.2.1 Text Retrieval Conference 178 11.2.2 Text Retrieval Conference Tracks 178 11.3 Search Engine Evaluation Parameters 179 11.3.1 Precision 179 11.3.2 Recall 180 11.3.3 Problems with Precision and Recall 180 11.3.4 Discounted Cumulative Gain 181 11.3.5 Normalized DCG 181 11.3.6 Click-Through 182 11.3.7 Eye Tracking 182 11.3.8 Coverage 183 11.3.9 Response Time 183 11.4 Factors Affecting Search Engines 183 11.4.1 Evaluation 183 11.4.2 Query Formulation 184 11.4.3 User Feedback to a Web Page 184 11.4.4 W3 Rules 185 11.4.5 Web Developers’ Fake Techniques 186 11.5 Conclusion 186 References 187 12 Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA 189 Seema Nayak, Manoj Nayak, Shamla Matri, Kanta Prasad Sharma 12.1 Introduction 190 12.2 Literature Survey 190 12.3 Methods and Materials 192 12.3.1 Conversion of MATLAB Code into Verilog HDL 192 12.3.2 Synthesis of Digital Filters on FPGA 193 12.4 Results and Discussion 194 12.4.1 Butterworth Filter 195 12.4.2 Chebyshev-I Filter 198 12.4.3 Chebyshev-II Filter 201 12.4.4 Elliptic Filter 204 12.5 Conclusion and Future Scope 207 References 208 13 Neural Networks and Their Applications 211 Shivani Joshi, Anju Gera, Sweta Bhadra 13.1 Introduction 212 13.2 Main Work of Neuron 212 13.3 Comparison Between Artificial Neural Network (ANN) and Biological Neural Network (BNN) 212 13.4 How Artificial Neural Network Works 213 13.4.1 Processing of ANN Building Blocks 214 13.4.2 Neural Network Learning Rules 217 13.5 Neural Networks and Their Applications 220 13.5.1 Image Processing and Character Recognition 221 13.5.2 Business Forecasting 221 13.5.3 Financial Prediction 221 13.5.4 Additional Neural Network Uses in the Economic World 221 13.5.5 The Traveling Salesman Problem 222 13.5.6 Medicine 223 13.5.7 Electronic Nose 223 13.5.8 Security 224 13.5.9 Loans and Credit Cards 224 13.5.10 Other Applications of Neural Networks 224 13.6 Conclusion and Future Scope 225 References 225 Editors 229
Les mer
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.
Les mer

Produktdetaljer

ISBN
9781119836209
Publisert
2024-12-12
Utgiver
Vendor
Wiley-Scrivener
Vekt
780 gr
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
272

Biographical note

Kanta Prasad Sharma, PhD, is an assistant professor in the Computer Science & Engineering Department at GL BAJAJ Group of Institutions. His PhD in Information Technology was obtained from Amity University, and he has published 15+ research papers in international journals and conference proceedings.

Shaurya Gupta, PhD, is an assistant professor at the University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India. He completed his PhD in Information Technology from Amity University and has published research articles in international journals. His areas of interest are Delay Tolerant Networks, Wireless Sensor Networks, Ad Hoc Networks, IOT, and Machine Learning.

Ashish Sharma, PhD, is one of the key faculty members of the information retrieval and data mining group at GLA University, India. He has published many research papers in international journals, and his research interests are in the applications of data mining, machine learning, big data, business analytics, data/text mining, healthcare informatics, and service-oriented computing.

Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has over 50 publications and edited/authored 15 computer science books.