Security issues and privacy concerns in Industry 4.0 applications / (Record no. 88281)

000 -LEADER
fixed length control field 13786cam a2200505 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240903130535.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240903b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119775621
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119776512
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119776511
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119776529
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111977652X
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119776505
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119776503
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1119775620
Qualifying information hardcover
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119776529
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1263188548
Canceled/invalid control number (OCoLC)1263696424
040 ## - CATALOGING SOURCE
Original cataloging agency UIU
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency UIU
Modifying agency OCLCO
-- DG1
-- N$T
-- UKAHL
-- YDX
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D38 2021
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person David, Shiblin,
Relator term author.
245 10 - TITLE STATEMENT
Title Security issues and privacy concerns in Industry 4.0 applications /
Statement of responsibility, etc Shiblin David, R.S. Anand, V. Jeyakrishnan, M. Niranjanamurthy.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken :
Name of publisher, distributor, etc Wiley-Scrivener,
Date of publication, distribution, etc 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
340 ## - PHYSICAL MEDIUM
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>Preface xiii<br/><br/>1 Industry 4.0: Smart Water Management System Using IoT 1<br/>S. Saravanan, N. Renugadevi, C.M. Naga Sudha and Parul Tripathi<br/><br/>1.1 Introduction 2<br/><br/>1.1.1 Industry 4.0 2<br/><br/>1.1.2 IoT 2<br/><br/>1.1.3 Smart City 3<br/><br/>1.1.4 Smart Water Management 3<br/><br/>1.2 Preliminaries 4<br/><br/>1.2.1 Internet World to Intelligent World 4<br/><br/>1.2.2 Architecture of IoT System 4<br/><br/>1.2.3 Architecture of Smart City 6<br/><br/>1.3 Literature Review on SWMS 7<br/><br/>1.3.1 Water Quality Parameters Related to SWMS 8<br/><br/>1.3.2 SWMS in Agriculture 8<br/><br/>1.3.3 SWMS Using Smart Grids 9<br/><br/>1.3.4 Machine Learning Models in SWMS 10<br/><br/>1.3.5 IoT-Based SWMS 11<br/><br/>1.4 Conclusion 11<br/><br/>References 12<br/><br/>2 Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues 15<br/>Abdullah Ayub Khan, Asif Ali Laghari, Shafique Awan and Awais Khan Jumani<br/><br/>2.1 Introduction 16<br/><br/>2.1.1 Network Forensics 16<br/><br/>2.1.2 The Fourth Industrial Revolution 17<br/><br/>2.1.2.1 Machine-to-Machine (M2M) Communication 18<br/><br/>2.1.3 Cloud Computing 18<br/><br/>2.1.3.1 Infrastructure-as-a-Service (IaaS) 19<br/><br/>2.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution 19<br/><br/>2.2 Generic Model Architecture 20<br/><br/>2.3 Model Implementation 24<br/><br/>2.3.1 OpenNebula (Hypervisor) Implementation Platform 24<br/><br/>2.3.2 NetworkMiner Analysis Tool 25<br/><br/>2.3.3 Performance Matrix Evaluation & Result Discussion 27<br/><br/>2.4 Cloud Security Impact on M2M Communication 28<br/><br/>2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0) 29<br/><br/>2.5 Conclusion 30<br/><br/>References 31<br/><br/>3 Regional Language Recognition System for Industry 4.0 35<br/>Bharathi V, N. Renugadevi, J. Padmapriya and M. Vijayprakash<br/><br/>3.1 Introduction 36<br/><br/>3.2 Automatic Speech Recognition System 39<br/><br/>3.2.1 Preprocessing 41<br/><br/>3.2.2 Feature Extraction 42<br/><br/>3.2.2.1 Linear Predictive Coding (LPC) 42<br/><br/>3.2.2.2 Linear Predictive Cepstral Coefficient (LPCC) 44<br/><br/>3.2.2.3 Perceptual Linear Predictive (PLP) 44<br/><br/>3.2.2.4 Power Spectral Analysis 44<br/><br/>3.2.2.5 Mel Frequency Cepstral Coefficients 45<br/><br/>3.2.2.6 Wavelet Transform 46<br/><br/>3.2.3 Implementation of Deep Learning Technique 46<br/><br/>3.2.3.1 Recurrent Neural Network 47<br/><br/>3.2.3.2 Long Short-Term Memory Network 47<br/><br/>3.2.3.3 Hidden Markov Models (HMM) 47<br/><br/>3.2.3.4 Hidden Markov Models - Long Short-Term Memory Network (HMM-LSTM) 48<br/><br/>3.2.3.5 Evaluation Metrics 49<br/><br/>3.3 Literature Survey on Existing TSRS 49<br/><br/>3.4 Conclusion 52<br/><br/>References 52<br/><br/>4 Approximation Algorithm and Linear Congruence: An Approach for Optimizing the Security of IoT-Based Healthcare Management System 55<br/>Anirban Bhowmik and Sunil Karforma<br/><br/>4.1 Introduction 56<br/><br/>4.1.1 IoT in Medical Devices 56<br/><br/>4.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System 57<br/><br/>4.1.3 Cryptography and Secret Keys 58<br/><br/>4.1.4 RSA 58<br/><br/>4.1.5 Approximation Algorithm and Subset Sum Problem 58<br/><br/>4.1.6 Significance of Use of Subset Sum Problem in Our Scheme 59<br/><br/>4.1.7 Linear Congruence 60<br/><br/>4.1.8 Linear and Non-Linear Functions 61<br/><br/>4.1.9 Pell’s Equation 61<br/><br/>4.2 Literature Survey 62<br/><br/>4.3 Problem Domain 63<br/><br/>4.4 Solution Domain and Objectives 64<br/><br/>4.5 Proposed Work 65<br/><br/>4.5.1 Methodology 65<br/><br/>4.5.2 Session Key Generation 65<br/><br/>4.5.3 Intermediate Key Generation 67<br/><br/>4.5.4 Encryption Process 69<br/><br/>4.5.5 Generation of Authentication Code and Transmission File 70<br/><br/>4.5.6 Decryption Phase 71<br/><br/>4.6 Results and Discussion 71<br/><br/>4.6.1 Statistical Analysis 72<br/><br/>4.6.2 Randomness Analysis of Key 73<br/><br/>4.6.3 Key Sensitivity Analysis 75<br/><br/>4.6.4 Security Analysis 76<br/><br/>4.6.4.1 Key Space Analysis 76<br/><br/>4.6.4.2 Brute-Force Attack 77<br/><br/>4.6.4.3 Dictionary Attack 77<br/><br/>4.6.4.4 Impersonation Attack 78<br/><br/>4.6.4.5 Replay Attack 78<br/><br/>4.6.4.6 Tampering Attack 78<br/><br/>4.6.5 Comparative Analysis 79<br/><br/>4.6.5.1 Comparative Analysis Related to IoT Attacks 79<br/><br/>4.6.6 Significance of Authentication in Our Proposed Scheme 85<br/><br/>4.7 Conclusion 85<br/><br/>References 86<br/><br/>5 A Hybrid Method for Fake Profile Detection in Social Network Using Artificial Intelligence 89<br/>Ajesh F, Aswathy S U, Felix M Philip and Jeyakrishnan V<br/><br/>5.1 Introduction 90<br/><br/>5.2 Literature Survey 91<br/><br/>5.3 Methodology 94<br/><br/>5.3.1 Datasets 94<br/><br/>5.3.2 Detection of Fake Account 94<br/><br/>5.3.3 Suggested Framework 95<br/><br/>5.3.3.1 Pre-Processing 97<br/><br/>5.3.3.2 Principal Component Analysis (PCA) 98<br/><br/>5.3.3.3 Learning Algorithms 99<br/><br/>5.3.3.4 Feature or Attribute Selection 102<br/><br/>5.4 Result Analysis 103<br/><br/>5.4.1 Cross-Validation 103<br/><br/>5.4.2 Analysis of Metrics 104<br/><br/>5.4.3 Performance Evaluation of Proposed Model 105<br/><br/>5.4.4 Performance Analysis of Classifiers 105<br/><br/>5.5 Conclusion 109<br/><br/>References 109<br/><br/>6 Packet Drop Detection in Agricultural-Based Internet of Things Platform 113<br/>Sebastian Terence and Geethanjali Purushothaman<br/><br/>6.1 Introduction 113<br/><br/>6.2 Problem Statement and Related Work 114<br/><br/>6.3 Implementation of Packet Dropping Detection in IoT Platform 115<br/><br/>6.4 Performance Analysis 120<br/><br/>6.5 Conclusion 129<br/><br/>References 129<br/><br/>7 Smart Drone with Open CV to Clean the Railway Track 131<br/>Sujaritha M and Sujatha R<br/><br/>7.1 Introduction 132<br/><br/>7.2 Related Work 132<br/><br/>7.3 Problem Definition 134<br/><br/>7.4 The Proposed System 134<br/><br/>7.4.1 Drones with Human Intervention 134<br/><br/>7.4.2 Drones without Human Intervention 135<br/><br/>7.4.3 Working Model 137<br/><br/>7.5 Experimental Results 137<br/><br/>7.6 Conclusion 139<br/><br/>References 139<br/><br/>8 Blockchain and Big Data: Supportive Aid for Daily Life 141<br/>Awais Khan Jumani, Asif Ali Laghari and Abdullah Ayub Khan<br/><br/>8.1 Introduction 142<br/><br/>8.1.1 Steps of Blockchain Technology Works 144<br/><br/>8.1.2 Blockchain Private 144<br/><br/>8.1.3 Blockchain Security 145<br/><br/>8.2 Blockchain vs. Bitcoin 145<br/><br/>8.2.1 Blockchain Applications 146<br/><br/>8.2.2 Next Level of Blockchain 146<br/><br/>8.2.3 Blockchain Architecture’s Basic Components 149<br/><br/>8.2.4 Blockchain Architecture 150<br/><br/>8.2.5 Blockchain Characteristics 150<br/><br/>8.3 Blockchain Components 151<br/><br/>8.3.1 Cryptography 152<br/><br/>8.3.2 Distributed Ledger 153<br/><br/>8.3.3 Smart Contracts 153<br/><br/>8.3.4 Consensus Mechanism 154<br/><br/>8.3.4.1 Proof of Work (PoW) 155<br/><br/>8.3.4.2 Proof of Stake (PoS) 155<br/><br/>8.4 Categories of Blockchain 155<br/><br/>8.4.1 Public Blockchain 156<br/><br/>8.4.2 Private Blockchain 156<br/><br/>8.4.3 Consortium Blockchain 156<br/><br/>8.4.4 Hybrid Blockchain 156<br/><br/>8.5 Blockchain Applications 158<br/><br/>8.5.1 Financial Application 158<br/><br/>8.5.1.1 Bitcoin 158<br/><br/>8.5.1.2 Ripple 158<br/><br/>8.5.2 Non-Financial Applications 159<br/><br/>8.5.2.1 Ethereum 159<br/><br/>8.5.2.2 Hyperledger 159<br/><br/>8.6 Blockchain in Different Sectors 160<br/><br/>8.7 Blockchain Implementation Challenges 160<br/><br/>8.8 Revolutionized Challenges in Industries 163<br/><br/>8.9 Conclusion 170<br/><br/>References 172<br/><br/>9 A Novel Framework to Detect Effective Prediction Using Machine Learning 179<br/>Shenbaga Priya, Revadi, Sebastian Terence and Jude Immaculate<br/><br/>9.1 Introduction 180<br/><br/>9.2 ML-Based Prediction 180<br/><br/>9.3 Prediction in Agriculture 182<br/><br/>9.4 Prediction in Healthcare 183<br/><br/>9.5 Prediction in Economics 184<br/><br/>9.6 Prediction in Mammals 185<br/><br/>9.7 Prediction in Weather 186<br/><br/>9.8 Discussion 186<br/><br/>9.9 Proposed Framework 187<br/><br/>9.9.1 Problem Analysis 187<br/><br/>9.9.2 Preprocessing 188<br/><br/>9.9.3 Algorithm Selection 188<br/><br/>9.9.4 Training the Machine 188<br/><br/>9.9.5 Model Evaluation and Prediction 188<br/><br/>9.9.6 Expert Suggestion 188<br/><br/>9.9.7 Parameter Tuning 189<br/><br/>9.10 Implementation 189<br/><br/>9.10.1 Farmers and Sellers 189<br/><br/>9.10.2 Products 189<br/><br/>9.10.3 Price Prediction 190<br/><br/>9.11 Conclusion 192<br/><br/>References 192<br/><br/>10 Dog Breed Classification Using CNN 195<br/>Sandra Varghese and Remya S<br/><br/>10.1 Introduction 195<br/><br/>10.2 Related Work 196<br/><br/>10.3 Methodology 198<br/><br/>10.4 Results and Discussions 201<br/><br/>10.4.1 Training 201<br/><br/>10.4.2 Testing 201<br/><br/>10.5 Conclusions 203<br/><br/>References 203<br/><br/>11 Methodology for Load Balancing in Multi-Agent System Using SPE Approach 207<br/>S. Ajitha<br/><br/>11.1 Introduction 207<br/><br/>11.2 Methodology for Load Balancing 208<br/><br/>11.3 Results and Discussion 213<br/><br/>11.3.1 Proposed Algorithm in JADE Tool 213<br/><br/>11.3.1.1 Sensitivity Analysis 218<br/><br/>11.3.2 Proposed Algorithm in NetLogo 218<br/><br/>11.4 Algorithms Used 219<br/><br/>11.5 Results and Discussion 219<br/><br/>11.6 Summary 226<br/><br/>References 226<br/><br/>12 The Impact of Cyber Culture on New Media Consumers 229<br/>Durmuş KoÇak<br/><br/>12.1 Introduction 229<br/><br/>12.2 The Rise of the Term of Cyber Culture 231<br/><br/>12.2.1 Cyber Culture in the 21st Century 231<br/><br/>12.2.1.1 Socio-Economic Results of Cyber Culture 232<br/><br/>12.2.1.2 Psychological Outcomes of Cyber Culture 233<br/><br/>12.2.1.3 Political Outcomes of Cyber Culture 234<br/><br/>12.3 The Birth and Outcome of New Media Applications 234<br/><br/>12.3.1 New Media Environments 236<br/><br/>12.3.1.1 Social Sharing Networks 237<br/><br/>12.3.1.2 Network Logs (Blog, Weblog) 240<br/><br/>12.3.1.3 Computer Games 240<br/><br/>12.3.1.4 Digital News Sites and Mobile Media 240<br/><br/>12.3.1.5 Multimedia Media 241<br/><br/>12.3.1.6 What Affects the New Media Consumers’ Tendencies? 242<br/><br/>12.4 Result 244<br/><br/>References 245<br/><br/>Index 251
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available to OhioLINK libraries.
520 ## - SUMMARY, ETC.
Summary, etc The scope of Security Issues, Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trend and the need for technological change in Industry 4.0. Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT based health care management system, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of the dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Shibin David is an assistant professor in the Department of Computer Science and Engineering at Karunya Institute of Technology and Sciences, India. His research interest includes cryptography, network security and mobile computing. He has an industry certification from Oracle, several awards, and a number of publications to his credit.<br/><br/>R. S. Anand is a researcher in the field of mechanical engineering at the Karunya Institute of Technology and Sciences, India, after being an assistant professor at the Narayana Guru College of Engineering from 2014 to 2016. He has numerous papers and presentations to his credit.<br/><br/>V. Jeyakrishnan, PhD, is an assistant professor at Saintgits College of Engineering, Kottayam, India. His research area includes wireless networks, cloud computing and its applications. He has a number of publications in his research area.<br/><br/>M. Niranjanamurthy, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He received his doctorate in computer science from JJTU, Rajasthan. He has over ten years of teaching experience and two years of industry experience as a software engineer. He has published four books, 70 papers, and has filed for 17 Patents with three so far granted. He is a reviewer for 22 international academic journals and has twice won Best Research Journal Reviewer award. He has numerous other awards and in is active in research associations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Authority record control number http://id.loc.gov/authorities/subjects/sh90001862.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Industry 4.0.
Authority record control number http://id.loc.gov/authorities/subjects/sh2020008861.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Anand, R. S.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jeyakrishnan, V.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Niranjanamurthy, M.,
Authority record control number http://id.loc.gov/authorities/names/n2021036363
Relator term author.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2024-09-03 Megatexts Phil. Inc. 005.8 D2807 2021 2024-09-03 2024-09-03 EBOOK