Security & Disaster Management

Security, Privacy, and Applications of the Internet of Things
Editors: Dr. Samarjeet Borah
Dr. B.K. Mishra
Prof. Hemant Kasturiwale
Dr. Payel Saha

Not for sale at this time
Security, Privacy, and Applications of the Internet of Things

Premarketing / Call for Chapters
Pub Date: TBA
Hardback Price: TBA | TBA
Hard ISBN: 
Pages: TBA
Binding Type: TBA
Notes: TBA

CALL FOR CHAPTER PROPOSALS

Short Description About the Volume:

The IoT is a key component of future technology, where thousands of things can feel, communicate, compute and use intelligent gadgets. IoT consists of overall, all-round, mobile, robotic, sensor networks, RFID, etc. It also gives interactive services to digital and physical worlds. IoT can provide a platform for creating smart and cost-effective new services and products. “Intelligent things” create large data streams that inundate the internet, leading to changes in standard data management practices. The focus of big data has, therefore, moved from business data warehouses to industrial, social, scientific, industrial, and medical devices. The clever cities, smart homes, vehicle communication, finance, manufacturing, agriculture, smart transit, security, to name a few, are some of the common areas that produce big data. Smart cities are an emerging topic that faces obstacles such as high applications diversity, interoperability, policy issues, Big Data, IoT infrastructure, different and diversified data sources, cross-domain analytics, and many more.


As IoT grew from all over the world, and technologies like cloud computing have been fueled by firewall or edge computing. IoT awareness differs from computers themselves. Self-conscious systems aim to make the internal operations, states and processes of the system aware of itself. However, IoT has also enabled awareness by merging global awareness of the system, the environment and people. It goes beyond systems that are self-conscious. Interoperability is one of the most vulnerable features of IoT. Such an understanding between people is possible, but when it comes to non-human items the issue becomes more complex. IoT‘s most hopeful views are based on a ubiquitous network of physical or virtual subjects with the ability to see, compute, communicate and operate services we all wish to offer. The fast growth of the IoT sector on the other hand also poses considerable cyber security risks. In the first half of 2019, IoT assaults tripled. The Internet Security Threat Report of Symantec 2019 demonstrates that cyber assaults on IoT systems are evolving rapidly. With an increasing number of data breaches annually, the global cyber threat continues to change at a rapid level. Medical services, retailers and public institutions suffered most infringements and the most events caused by harmful individuals. Some of these industries are more attractive to cyber thieves as they acquire financial and medical information, but all companies using networks are customer, corporate spy, or customer attacks targeting each other. Cyber-attacks tend to lead to sensitive information being accessed, changed or detreated; user money was extorted or routine company processes were interrupted.

It is extremely difficult to implement effective cybersecurity measures nowadays as more gadgets are available than humans, and attackers become cleverer. A good strategy to cyber safety includes various protection layers on computers, networks, applications or data, which you wish to keep secure. People, methods, and technology must be mutually complementary in a corporation in order to provide efficient cyber threats.

The volume aims to incorporate insight, software, experimental technology, and field investigations and will provide directions for future fields of research. The study will represents widespread and fresh approach for cybersecurity research.

Coverage:

Potential contributors are requested to consider submitting their contributions for enriching the scholarly content of the intended volume.


The volume will cover various security, privacy issues along with and applications of Internet of Things. Following are the broad areas including, but not limited to:

1. Overview of fundamental IoT principles and technologies
2. IoT computing large data and data management
3. Intellectual IoT systems machinery and artificial intelligence
4. Studies of security and privacy and social conduct of people on IoT
5. Wearable sensors, IoT-based bio-sensor networks
6. Advanced IoT computing security technology
7. Sensor issues, business models, concepts, paradigms, green IoT and solutions for addressing pertinent concerns
8. Smart IoT-based services
9. Practical concepts of employing IoT, how the ecosystem, social objects and their relationships are approached with human dynamics.
10. Optimization and scheduling for IoT computing
11. Scheduling algorithms for distributed systems
12. Service provisioning and resource management for IoT computing
13. Process mining and analysis for IoT computing
14. Applications of intelligent IoT computing

Important Dates:

Abstract Submission Deadline: 20/11/2021
Initial Author Notification: 30/11/2021
Full Chapter Submission Deadline: 20/12/2021
Author Notification: 30/12/2021
Final Manuscript Submission: 20/01/2022

To submit proposals for consideration, please contact:
hemant.kasturiwale@thakureducation.org
samarjeet.b@smit.smu.edu.in


About the Authors / Editors:
Editors: Dr. Samarjeet Borah
Professor, Department of Computer Applications, SMIT, Sikkim Manipal University
Email-samarjeet.b@smit.smu.edu.in
Phone: +91 9832621898


Dr. B.K. Mishra
Professor, Electronics & Telecommunication Engineering Department, TCET
Email - tcet.principal@thakureducation.org
Phone: +91 9821285825


Prof. Hemant Kasturiwale
Associate Professor, Electronics Engineering Department, TCET
Email: hemant.kasturiwale@thakureducation.org
Mobile no.: +91 9869484861


Dr. Payel Saha
Professor, Electronics & Telecommunication Engineering Department, TCET
Email: payel.saha@thakureducation.org
Mobile no.: +91 9819412736





Follow us for the latest from Apple Academic Press:
Copyright © 2024 Apple Academic Press Inc. All Rights Reserved.