Data security in internet of things based RFID and WSN systems applications
Author(s)
Bibliographic Information
Data security in internet of things based RFID and WSN systems applications
(Internet of everything (IoE) : security and privacy paradigm / series editors Vijender Kumar Solanki, Raghvendra Kumar, and Le Hoang Son)
CRC Press, 2021
1st ed
- : hbk
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services.
This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security.
It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
Table of Contents
Chapter 1 An Intelligent and Optimistic Disease Diagnosis: An IoT-Based Smart City Paradigm
Chapter 2 Soft Computing Techniques for Boolean Function and Reliability-Based Approach of Blood Bank Supply Chain Management with Distribution Center Using Vector-Evaluated Genetic Algorithm
Chapter 3 Synthesis and Design of Energy- and Power-Efficient IoT-Enabled Smart Park
Chapter 4 Machine Learning Security Allocation in IoT using Raspberry Pi
Chapter 5 The Implementation of the Concept of Lean Six Sigma Management
Chapter 6 Design and Performance Analysis of Carrier Depletion PIN Phase Shifter for 50 Gbps Operation
Chapter 7 Soft Computing Techniques for Blood Bank Inventory Model for Decaying Items with Storage Using Particle Swarm Optimization
Chapter 8 Live Virtual Machine Migration Techniques in Cloud Computing
Chapter 9 Dynamic Exchange Buffer Switching and Blocking Control in Wireless Sensor Networks
Index
by "Nielsen BookData"