Blockchain Internet of Things and Artificial Intelligence 1st Edition By Naveen Chilamkurti, T Poongodi, Balamurugan Balusamy – Ebook PDF Instant Download/Delivery: 0367724480 ,9780367724481
Full download Blockchain Internet of Things and Artificial Intelligence 1st Edition after payment
Product details:
ISBN 10: 0367724480
ISBN 13: 9780367724481
Author: Naveen Chilamkurti, T Poongodi, Balamurugan Balusamy
Blockchain Internet of Things and Artificial Intelligence 1st Edition Table of contents:
Chapter 1: Blockchain
1.1 Introduction
1.1.1 Evolution of Blockchain
1.1.2 Characteristics of Blockchain Technology
1.2 Components of Blockchain
1.2.1 Cryptographic Hash Functions
1.2.2 Asymmetric-Key Cryptography
1.2.3 Transactions
1.2.4 Ledgers
1.2.5 Blocks
1.2.5.1 Merkle Tree
1.2.6 Consensus Algorithms
1.2.6.1 Proof of Work (PoW)
1.2.6.2 Proof of Stake (PoS)
1.2.6.3 Practical Byzantine Fault Tolerance (PBFT)
1.2.6.4 Delegated Proof of Stake (DPOS)
1.2.6.5 Round Robin Consensus Model
1.2.6.6 Proof of Authority (Identity) Model
1.2.6.7 Proof of Elapsed Time Consensus Model (PoET)
1.3 Types of Blockchain
1.3.1 Public Blockchain
1.3.2 Private Blockchain
1.3.3 Consortium Blockchain
1.3.4 Hybrid Blockchain
1.3.5 Permissionless Blockchain
1.3.6 Permissioned Blockchain
1.3.7 Stateless Blockchain
1.3.8 Stateful Blockchain
1.4 Blockchain Use Cases
1.4.1 Blockchain in Supply Chain Management
1.4.1.1 Provenance Tracking
1.4.1.2 Transparency
1.4.2 Blockchain in Logistics
1.4.2.1 DexFreight
1.4.2.2 GS1
1.4.3 Blockchain in Banking
1.4.3.1 Digital Identity Verification
1.4.3.2 Auditing and Accounting
1.4.3.3 Faster Payments
1.4.3.4 Clearance and Settlement Systems
1.4.3.5 Asset Management
1.4.4 Blockchain in Education
1.4.4.1 Certificates Management
1.4.4.2 Learning Outcome Management
1.4.4.3 Collaborative Environment
1.4.4.4 Transfer of Fees and Credits
1.4.5 Environmental Awareness and Waste Management
1.5 Challenges and Opportunities
1.6 Conclusion
References
Chapter 2: Internet of Things
2.1 Overview of Internet of Things
2.1.1 Introduction
2.1.2 History of IoT
2.1.3 Characteristics of IoT
2.1.3.1 Interconnectivity
2.1.3.2 Heterogeneous Devices
2.1.3.3 Dynamic Nature
2.1.3.4 Ensuring Safety
2.1.3.5 Intelligence
2.1.3.6 Sensing
2.1.3.7 Energy Efficiency
2.1.3.8 Cost
2.1.4 Advantages of Internet of Things
2.1.5 IoT Challenges
2.1.5.1 Data Scalability
2.1.5.2 Huge Data Storage
2.1.5.3 Bandwidth Issues
2.1.5.4 Analytics of Data
2.1.5.5 Privacy and Security
2.2 IoT Architecture
2.2.1 IoT Devices
2.2.1.1 Sensors
2.2.1.2 Actuators
2.2.1.3 IoT Gateways
2.2.1.4 Cloud
2.2.1.5 Data Analytics
2.2.1.6 User Interface (UI)
2.2.2 IoT Protocols
2.2.2.1 Connectivity
2.2.2.2 Identification
2.2.2.3 Data Protocols
2.2.2.4 Communication Protocols
2.2.3 IoT Applications
2.2.3.1 Consumer Applications
2.2.3.2 Educational Applications
2.2.3.3 Industrial Applications
2.2.3.4 Agricultural Applications
2.3 Relevance of Blockchain
2.3.1 Blockchain Technology
2.3.2 Blockchain Component
2.3.3 Advantages of Blockchain
2.3.4 Applications of Blockchain
2.4 IoT Security Framework
2.4.1 IoT Layers
2.4.1.1 Application Layer
2.4.1.2 Network Layer
2.4.1.3 Perception Layer
2.4.2 Security Attacks in IoT
2.4.2.1 Identity-Based Attacks
2.4.2.2 Non-Identity Based Attacks
2.5 Conclusion
References
Chapter 3: Artificial Intelligence
3.1 Introduction
3.2 Intellectual Overview of AI
3.2.1 Problem Solving by Searching Algorithms
3.2.1.1 Distinct Problem and Solutions
3.2.1.2 Searching for Solutions
3.2.1.3 Uninformed Search
3.2.1.4 Informed Search
3.2.1.5 Pure Heuristic Search
3.2.2 Task Domains of AI
3.3 Frontiers of AI
3.3.1 Knowledge Representation
3.3.1.1 Types of Knowledge in AI
3.3.1.2 Relation between Knowledge and Intelligence
3.3.1.3 Techniques of Knowledge Representation
3.3.2 Computational Logics
3.3.2.1 Approaches
3.3.2.2 Types of Computational Logic
3.3.2.3 Representations of Computational Logic Connectives
3.4 AI Algorithms and Approaches
3.4.1 Machine Learning
3.4.2 AI Algorithms
3.4.3 Types of Problem-Solving Using AI Algorithms
3.5 Challenges Faced in Converging Blockchain and AI Techniques
3.5.1 AI and Blockchain–Technologies Integration
3.5.2 Impact of Blockchain-AI Convergence
3.5.2.1 Challenges
3.6 Conclusion
References
Chapter 4: Blockchain for Internet of Things I
4.1 Introduction
4.1.1 Overview
4.1.2 Applications of IoT
4.1.2.1 Traffic Management
4.1.2.2 Waste Management
4.1.2.3 Smart Home and Buildings
4.1.2.4 Smart Grid
4.1.2.5 Smart E-Health
4.1.2.6 Smart Industry and Manufacturing
4.1.2.7 Smart Logistics and Retail
4.1.2.8 Smart Agriculture
4.1.3 Blockchain Integrated IoT Architecture
4.1.4 Security Frameworks Using Blockchain
4.2 Blockchain IoT Paradigm
4.2.1 Blockchain-Enabled IoT Security
4.2.2 Challenges
4.2.2.1 Storage: Capacity and Scalability
4.2.2.2 Security: Weakness and Threats
4.2.2.3 Privacy: Anonymity and Data Privacy
4.3 Blockchain Technologies for IoT Environment
4.3.1 Universal Digital Ledgers
4.3.2 Distributed Ledgers in IoT
4.3.3 Distributed Ledgers SOTA
4.3.4 Consensus Mechanism
4.3.5 Decentralization
4.3.6 Self-Sovereign Identity
4.3.6.1 Overview
4.3.6.2 Traditional Identity Management System (IdMS)
4.3.6.3 Blockchain Identity Solutions
4.3.6.4 Challenges in IdMS
4.3.7 Smart Contract and Compliance
4.4 Conclusion
References
Chapter 5: A Comprehensive Overview of Blockchain-Driven IoT applications
5.1 Introduction
5.2 Blockchain Overview
5.2.1 The Key Components of Blockchain Technology
5.2.1.1 Decentralization
5.2.1.2 Distributed Shared Ledger
5.2.1.3 Cryptography
5.2.2 Consensus Mechanism in Blockchain
5.2.2.1 Proof of Work (PoW)
5.2.2.2 Proof of Stake (PoS) [15,16]
5.2.2.3 Practical Byzantine Fault Tolerance (PBFT)
5.2.2.4 Smart Contracts [5,19]
5.3 IT Protocols Stack
5.3.1 Security Concerns in IoT Applications
5.3.1.1 Data Privacy
5.3.1.2 IoT Device Authentication
5.3.1.3 Trustable Users
5.3.1.4 Access Control of IoT Devices
5.3.1.5 Cryptographic Keys and Hashing of Data
5.3.2 Blockchain-Driven IoT Applications
5.3.2.1 Intelligence Transport System (ITS)
5.3.2.2 Supply Chain Management Systems
5.3.2.3 Smart Healthcare
5.3.2.4 Smart City
5.3.2.5 IoT Ecosystem
5.4 Beyond Cryptocurrencies and Bitcoin
5.4.1 Public Blockchain
5.4.2 Private Blockchain
5.4.3 Ethereum
5.4.4 Hyperledger
5.4.5 Hyperledger Fabric
5.4.6 R3 Corda
5.5 Case Study on Decentralized Block Chain Approach for Healthcare Systems
5.5.1 Scenario 1: Primary Patient Care
5.5.2 Scenario 2: Healthcare Data Aggregation for Study and Research Purpose
5.5.3 Application Scenario for Healthcare Systems
5.5.4 Proposed Framework of Blockchain-Driven Healthcare Systems
5.6 Performance Challenges of Blockchain-Driven IoT Applications
5.6.1 Integrity
5.6.2 Anonymity
5.6.3 Scalability
5.7 Conclusion and Future Scope
References
Chapter 6: Artificial Intelligence for Blockchain I
6.1 Introduction
6.1.1 Advantages of Blockchain
6.1.2 Flaws in Blockchain
6.1.3 Artificial Intelligence: Simulation of Human Intelligence
6.1.4 Integration of Artificial Intelligence and Blockchain
6.2 Blockchain Ledger Data Decision Using Artificial Intelligence
6.2.1 Distributed Ledger
6.2.2 System Overview
6.2.2.1 Environment
6.2.2.2 Transactions
6.2.2.3 Staking
6.2.2.4 Tasks
6.2.2.5 Protocol
6.3 Increasing Blockchain Efficiency Using AI
6.3.1 Significance of AI and Blockchain Collaboration
6.3.2 Blockchain Efficiency
6.3.3 Benefits of Integration of AI and Blockchain
6.3.4 Challenges of AI and Blockchain Integration
6.4 Blockchain-Based Decentralized Artificial Intelligence
6.4.1 Centralized Network
6.4.2 Decentralized Network
6.4.3 Distributed Network
6.4.4 Decentralized Artificial Intelligence
6.4.5 AI & Blockchain: The Magnificent Unification
6.4.6 Centralized versus Decentralized Artificial Intelligence
6.4.7 The Data Centralization Problem
6.4.8 The Model Centralization Problem
6.4.9 Some Other Centralization Problems
6.4.10 Trust Problem with Centralized Big Data
6.4.11 Collaboration between Blockchain and AI
6.4.12 Blockchain-Based Platform for AI
6.4.13 Blockchain Contribution in Decentralization
6.4.14 Design Overview
6.4.14.1 Training Process Design
6.5 Sensitive Blockchain Backup Using AI
6.5.1 Types of AI
6.5.2 The Working of Artificial Intelligence
6.5.3 AI and Virtual Machine Backups
6.6 Combining Blockchain and AI for Monetization of Data
6.6.1 Data Monetization
6.6.1.1 Direct Data Monetization
6.6.1.2 Indirect Data Monetization
6.6.2 Data Monetization with Blockchain Technology
6.6.2.1 Recognize Different Types of Data and Their Use Cases
6.6.2.2 Identify Prospective Buyers
6.6.2.3 Select a Suitable Blockchain-Based Data Monetization Company
6.6.3 Data Monetization with Artificial Intelligence
6.6.3.1 Creating New Digital Services
6.6.3.2 Addressing Customer Churn
6.6.3.3 Unlocking Value and Insights
6.7 Trusting AI Decision Making for Blockchain Environment
6.7.1 State-of-the-Art
6.7.2 Blockchain-Based Framework for Trustworthy AI
6.8 Conclusion
References
Chapter 7: Artificial Intelligence for Blockchain II
7.1 Introduction
7.2 Performing Data-Centric Analysis and Information Flow by Integrating Blockchain and AI
7.2.1 AI and Blockchain Use in Cardiovascular Medicine
7.2.2 Integration of Blockchain with AI in Cardiovascular Medicine
7.2.3 Challenges
7.3 AI-Based Healthcare Using Smart Contracts (Blockchain)
7.3.1 Opportunities That AI Bring to Smart Contracts
7.3.2 AI Factors Need to Be Considered in Blockchain
7.3.3 Smart Contracts Integration with AI
7.3.4 Use Cases of Blockchain with AI in Healthcare
7.3.5 Future Scope of Smart Contracts in AI
7.4 Decentralizing and Accelerating Biomedical Research and Healthcare by Integrating Blockchain Technology and Artificial Intelligence
7.4.1 Advancements in AI
7.4.2 Introduction to Highly Distributed Storage Systems
7.4.3 Exonum Framework for Blockchain Projects
7.4.3.1 Network
7.4.3.2 Transport Layer
7.4.3.3 Authentication and Authorization
7.4.3.4 Lightweight Client
7.4.3.5 Consensus
7.4.4 Health Data on Blockchain
7.4.5 Ensuring the Quality of the Data and Consistency by Using Deep Learning Methods
7.5 Using AI and Blockchainto Personalize Treatment Plans and Diagnosis
7.5.1 Patient Sphere Uses AI and Blockchain to Customize Patient Treatment Plans
7.5.2 Blockchain and AI Helping in Self-Testing
7.6 Conclusion
References
Chapter 8: Fusion of IoT, Blockchain and Artificial Intelligence for Developing Smart Cities
8.1 Introduction
8.2 Consent Management Based on Blockchain and AI in IoT Ecosystem
8.2.1 Consent Management Component (CMC)
8.2.2 Consent Notary Component
8.2.3 Intelligence Component
8.3 Blockchain to Secure IoT against Attacks
8.3.1 Role of Blockchain
8.3.1.1 Blockchains against Availability Threat
8.3.1.2 Blockchain against Integrity Threat
8.3.1.3 Blockchain against Confidentiality Threat
8.3.1.4 Blockchain against Authenticity Threat
8.3.1.5 Blockchain against Accountability Threat
8.4 Artificial Intelligence for IoT Enabled Smart Cities
8.5 Optimizing Risk Minimization in Smart Cities Using Blockchain
8.5.1 Different Risks in Blockchain
8.5.1.1 Business Continuity Risk
8.5.1.2 Information Security Risk
8.5.1.3 Contract Risk
8.5.1.4 Supplier Risks
8.5.1.5 Reputational Risk
8.5.1.6 Consensus Protocol Risk
8.5.1.7 Key Management and Data Confidentiality Risk
8.5.2 Risk Minimization in Smart Energy Usage in Blockchain
8.5.2.1 Impact on Energy Sector Using Blockchain
8.5.2.2 Research Projects Using Blockchain in Energy Sectors
8.5.3 Risk Minimization in Transportation Systems Using Blockchain
8.5.3.1 Useful in Tracking
8.5.3.2 Advantages of Smart Contract
8.5.3.3 Reduce Paper-Based Ticketing System
8.5.3.4 Decentralized Public Transportation System
8.5.4 Risk Minimization in E-Governance
8.5.4.1 Online Registration of Birth and Death Certificate
8.5.4.2 Real Estate
8.5.5 Risk Minimization in Agriculture Using Blockchain
8.6 Securing Smart City Using Blockchain Technology
8.6.1 Digital Signature
8.6.2 Homomorphic Encryption
8.7 Conclusion
References
Chapter 9: Impact of AI, BC and IoT for Smart Cities
9.1 Introduction
9.2 How Does Blockchain Work?
9.2.1 Structure of Blockchain
9.2.2 Hash Function and Encryption
9.2.3 Transactions and Mining
9.3 Blockchain Security
9.3.1 Standard Cybersecurity versus Block Chain Security
9.3.1.1 Security Analysis
9.3.2 Security and Privacy Properties of Blockchain
9.3.3 How the Infusion of Blockchain Solves Vulnerable Issues over Three Zones: MLCL-FoG
9.4 Integration of IoT over Blockchain
9.4.1 Need for Securing IoT Using Blockchain
9.4.2 Advantages of Integrating IoT with Ethereum Blockchain
9.5 Stalker Miner
9.5.1 Defense against Stalker Miner
9.6 Conclusion
References
Chapter 10: Influence of AI, IoT and BC for Healthcare in Smart Cities – I
10.1 Introduction to Evolution of Healthcare Industry
10.1.1 Healthcare Industry
10.1.2 Health Information Management (HIM)
10.1.3 Electronic Health Record
10.1.4 Electronic Medical Record
10.2 Smart Healthcare
10.2.1 Artificial Intelligence in Healthcare
10.2.2 IoT in Healthcare
10.2.3 Blockchain in Healthcare
10.3 Personalized Healthcare
10.4 Elderly Healthcare
10.5 Patient Management
10.6 Conclusion
References
Chapter 11: Influence of AI, BC and IoT for Healthcare – II
11.1 Introduction
11.1.1 What Is EHR?
11.1.2 General Structure of the Healthcare System Using EHR
11.1.2.1 Generic Care Record Requirements
11.1.2.2 Healthcare Record (EPR)
11.1.2.3 Shared Care EHR
11.1.3 Advantages of EHR
11.1.4 How to Implement an EHR?
11.1.5 Problems with EHR
11.2 Applications of Machine Learning Techniques for EHR Maintenance
11.3 Application of Internet of Things in Healthcare
11.4 Application of Blockchain in Healthcare: A Case Study
11.5 Detecting Fraudulent Behavior
11.5.1 Application of Supervised and Unsupervised ML Methods
11.6 Payments through Cryptocurrency
11.6.1 Cryptocurrency Platforms in Healthcare
11.7 Robo-Dentists
11.7.1 Application of Robots in Dental Care
11.8 Conclusion
References
Chapter 12: How IoT, AI, and Blockchain Will Revolutionize Business
12.1 Introduction
12.2 Internet of Things
12.2.1 IoT Architecture
12.3 Artificial Intelligence
12.4 Blockchain
12.5 Business Models on the Intersection of IoT, AI, and Blockchain
12.5.1 Supply Chain
12.5.2 Agriculture
12.5.3 Healthcare
12.5.4 Finance and Banking
12.5.5 Social Network
12.6 Emerging Trends in Financial Services
12.7 Catalyst of Digital Transformation
12.7.1 Mobile Phone as Catalyst of Digital Transformation
12.8 Conclusion
References
Chapter 13: Storage, System Security and Access Control for Big Data IoT
13.1 Introduction
13.2 Big Data Integration with IoT
13.2.1 Key Requirements of Big Data Analytics in IoT
13.2.2 Big Data Analytical Solutions
13.2.2.1 Apache Hadoop
13.2.2.2 ThingSpeak
13.2.2.3 Countly
13.2.2.4 AT&T IoT Platform
13.2.2.5 Axonize
13.3 Storage Technologies
13.3.1 Key-Value Database
13.3.2 Column-Oriented Database
13.3.3 Document-Oriented Database
13.3.4 Graph Database
13.3.5 Cloud-Based IoT Platforms
13.3.5.1 AWS IoT Suite
13.3.5.2 Google Cloud IoT
13.3.5.3 Microsoft Azure IoT Suite
13.3.5.4 Salesforce IoT
13.3.5.5 IBM Watson Internet of Things
13.4 Security Attacks at the IoT Layered Architectures and Protection with Security Mechanisms
13.4.1 Perception Layer
13.4.1.1 Protection Mechanism
13.4.2 Transport Layer
13.4.2.1 Protection Mechanism
13.4.3 Processing Layer
13.4.3.1 Protection Mechanism
13.4.4 Application Layer
13.4.4.1 Protection Mechanism
13.4.5 Business Layer
13.4.5.1 Protection Mechanism
13.5 Access Control Mechanisms
13.5.1 Platform-Specific Approaches
13.5.1.1 MapReduce
13.5.1.2 NoSQL Data Stores
13.5.2 Platform-Independent Approaches
13.5.3 Domain-Specific Approaches
13.6 Key Challenges and Future Directions
13.7 Conclusion
References
Chapter 14: Security Challenges and Mitigation Approaches for Smart Cities
14.1 Introduction
14.1.1 Smart City Development
14.1.2 IoT Devices and Configuration
14.1.2.1 Life Cycle of IoT Devices
14.1.2.2 Layered Configuration of IoT Devices
14.1.3 Big Data in IoT
14.1.3.1 Challenges of Big Data
14.1.3.2 Database versus Big Data
14.2 Database Authorization Workflow and Management Structure
14.2.1 Transaction Failures
14.2.2 Database Control Management and Protocols
14.2.2.1 Transaction Management
14.2.2.2 Concurrency Protocols
14.3 Database Security System
14.3.1 Internal Attacks
14.3.2 External Attacks
14.3.3 Preventive Measures for Database Attacks
14.4 Smart City Infrastructure
14.5 Challenges and Security Issues
14.6 Security Mechanism and Mitigations
14.6.1 Protocol Overhead Frame Size
14.6.2 Authentication Management
14.6.3 Access Control Management
14.6.4 CoRE Network Digital Signature Management
14.6.5 DoS/DDoS Resistance
14.6.6 Security in Database Authentication
14.6.7 Dynamic Distributed Key Management System
14.7 Network Layer-Based Security Management System
14.7.1 Protocol Analysis
14.7.2 Protocol Security Mechanism
14.7.3 Lightweight Cryptographic Mechanisms
14.7.4 Penetration Testing Analysis
14.8 Future Direction
14.9 Conclusion
References
Chapter 15: Security of IoT in Healthcare
15.1 Introduction
15.1.1 Benefits of IoT
15.1.2 Disadvantages of IoT
15.2 Key Qualities of IoT
15.3 Applications of IoT
15.4 Types of IoT-Enabled Devices
15.5 IoT-Integrated Healthcare Devices
15.5.1 Examples of Existing IoT-Enabled Devices
15.5.1.1 Pulse Oximeters
15.5.1.2 Treatment of Cancer
15.5.1.3 Mood Enhancers
15.5.1.4 Continuous Glucose Monitoring System
15.5.1.5 Smart Bandages
15.5.1.6 Smart Beds
15.5.1.7 Healthcare Charting
15.6 Security in IoT
15.7 Security Challenges in IoT-Based Devices
15.8 Security Architecture
15.9 Vulnerabilities in IoT Devices
15.9.1 Feeble Passwords
15.9.2 Transfer of Data on an Unsecure Channel
15.9.3 Inadequate Measures of Device Management
15.9.4 Devices with Default Settings
15.9.5 Unsure Interfaces
15.10 Security Attacks towards IoT and WSN
15.10.1 Countermeasures against Various Attacks towards IoT and WSN
15.11 Security Attacks towards RFID in IoT
15.11.1 Limitations of RFID
15.11.2 Security Issues in RFID
15.12 Conclusion
References
Chapter 16: Healthcare Internet of Things – The Role of Communication Tools and Technologies
16.1 Introduction
16.1.1 Healthcare IoT
16.2 IoT Tools and Technologies
16.2.1 Microcontrollers and Operating Systems
16.2.1.1 Raspberry Pi
16.2.1.2 Arduino
16.2.1.3 ESP-8266
16.2.1.4 RTOS
16.3 Low-Power Embedded Systems
16.4 Communication Options
16.4.1 ZIGBEE
16.4.2 LoRa
16.4.3 Wi-Fi
16.4.4 Low-Power, Short Range IoT Networks
16.5 IoT Device Management
16.5.1 Indoor Air Quality Meter
16.5.2 Wearables
16.5.3 Sensors
16.5.4 Storage Options for IoT
16.5.4.1 Storage Options
16.6 IoT Analytics
16.6.1 Uniqueness of IoT Analytics
16.7 Conclusion
References
Index
People also search for Blockchain Internet of Things and Artificial Intelligence 1st Edition:
blockchain, internet of things, and artificial intelligence
blockchain internet of things and artificial intelligence
internet of things artificial intelligence and blockchain technology
blockchain and internet of things
blockchain artificial intelligence
Tags: Naveen Chilamkurti, T Poongodi, Balamurugan Balusamy, Blockchain, Internet, Artificial Intelligence