(0)

IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

E-kirja


This volume explores IoT architectures, their configuration, and operability in wireless sensor networks.

The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers.

The book is intended as a resource for graduate and postgraduate students for understanding network design for home and embedded applications, specifically using single board computing devices. It also serves as a guide for networking courses and assessments.

Readership

Graduate and post graduate students and faculty members in the field of networking and IoT.


Muoto:

  • E-kirja

Kesto:

  • • 175 sivut

Kieli:

englanti


Muut ovat myös lukeneet

Ohita lista
  1. CYBER SECURITY HANDBOOK Part-2 : Lock, Stock, and Cyber: A Comprehensive Security Handbook

    Poonam Devi

    book
  2. Russian Cyber Activity – The Grizzly Steppe Report : Strategy and Hacking Techniques Used to Interfere the U.S. Elections and to exploit Government and Private Sectors

    U.S. Department of Homeland Security, Federal Bureau of Investigation

    book
  3. CC Certified in Cybersecurity Study Guide

    Mike Chapple

    audiobook
  4. Alice and Bob Learn Application Security

    Tanya Janca

    audiobook
  5. The Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections

    U.S. Department of Homeland Security, Federal Bureau of Investigation

    book
  6. The Ultimate Guide -Proxies & VPN's

    Magelan Cyber Security

    book
  7. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide : 2nd Edition

    Ben Malisow

    audiobook
  8. Russian Cyber Attack - Grizzly Steppe Report & The Rules of Cyber Warfare : Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law

    U.S. Department of Defense, Department of Homeland Security, Federal Bureau of Investigation, Strategic Studies Institute, United States Army War College

    book
  9. Rethinking IT Security : What Needs to Be Said — How Can We Solve the IT Security Problem Long Term?

    Svavar Ingi Hermannsson

    audiobook
  10. International Conflicts in Cyberspace - Battlefield of the 21st Century : Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    U.S. Department of Defense, Strategic Studies Institute, United States Army War College, Department of Homeland Security, Federal Bureau of Investigation

    book
  11. Hyvät pahat verot

    Reijo Knuutinen

    book
  12. CYBER SECURITY HANDBOOK Part-1 : Hacking the Hackers: Unraveling the World of Cybersecurity

    Poonam Devi

    book