About the Editors |
|
xv | |
|
|
xix | |
|
1 Analysis and Clustering of Sensor Recorded Data to Determine Sensors Consuming the Least Energy |
|
|
1 | (32) |
|
|
|
|
|
|
|
|
1 | (1) |
|
1.2 The Working of WSNs and Sensor Nodes |
|
|
2 | (1) |
|
1.3 Classification of WSNs |
|
|
3 | (3) |
|
1.3.1 Benefits and Drawbacks of Centralized Techniques |
|
|
5 | (1) |
|
1.3.2 Benefits and Drawbacks of Distributed Techniques |
|
|
6 | (1) |
|
|
6 | (2) |
|
1.4.1 Layer-or Level-based Security |
|
|
7 | (1) |
|
1.5 Energy Consumption Issues |
|
|
8 | (1) |
|
1.6 Commonly Used Standards and Protocols for WSNs |
|
|
9 | (3) |
|
|
10 | (1) |
|
1.6.1.1 Time Division Multiple Access |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.6.1.3 Sensor Medium Access Control |
|
|
11 | (1) |
|
1.7 Effects of Temperature and Humidity on the Energy of WSNs |
|
|
12 | (2) |
|
1.7.1 Effects of Temperature on Signal Strength |
|
|
13 | (1) |
|
1.7.2 Effects of Humidity on Signal Strength |
|
|
13 | (1) |
|
1.7.3 Temperature vs. Humidity |
|
|
14 | (1) |
|
|
14 | (7) |
|
1.8.1 Information Gathering and Analysis |
|
|
16 | (1) |
|
1.8.2 System Design and Implementation |
|
|
16 | (3) |
|
1.8.3 Testing and Evaluation |
|
|
19 | (2) |
|
|
21 | (12) |
|
|
22 | (11) |
|
2 Impact of Artificial Intelligence in Designing of 5G |
|
|
33 | (18) |
|
|
|
2.1 5G -- An Introduction |
|
|
33 | (4) |
|
2.1.1 Industry Applications |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
2.1.7 Sustainability of 5G Networks |
|
|
35 | (1) |
|
2.1.8 Implementation of 5G |
|
|
36 | (1) |
|
2.1.9 Architecture of 5G Technology |
|
|
36 | (1) |
|
|
37 | (2) |
|
2.2.1 Gaming and Virtual Reality |
|
|
38 | (1) |
|
|
39 | (5) |
|
2.3.1 Continuous Learning AI Model |
|
|
42 | (2) |
|
2.4 Challenges and Roadmap |
|
|
44 | (3) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
2.5.1 The Insights of Mathematical Modeling in 5G Networks |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
49 | (2) |
|
3 Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology |
|
|
51 | (16) |
|
|
|
|
|
51 | (2) |
|
|
53 | (4) |
|
3.2.1 The Internet of Things |
|
|
53 | (1) |
|
3.2.1.1 Security Requirements in Wireless IoT |
|
|
53 | (1) |
|
3.2.1.2 Layered Architecture of Wireless IoT |
|
|
54 | (1) |
|
3.2.2 Blockchain Technology |
|
|
55 | (1) |
|
3.2.2.1 Types of Blockchain |
|
|
55 | (1) |
|
3.2.2.2 Integration of Blockchain with Wireless Internet of Things |
|
|
56 | (1) |
|
|
57 | (2) |
|
3.3.1 Security Issues in Wireless IoT System |
|
|
57 | (1) |
|
3.3.2 Solutions of Wireless IoT Security Problem |
|
|
58 | (1) |
|
|
59 | (3) |
|
3.5 Comparison of Various Existing Solutions |
|
|
62 | (1) |
|
3.6 Discussion of Research Questions |
|
|
62 | (1) |
|
3.7 Future Scope of Blockchain in IoT |
|
|
63 | (1) |
|
|
63 | (4) |
|
|
64 | (3) |
|
4 Cognitive IoT-Based Health Monitoring Scheme Using Non-Orthogonal Multiple Access |
|
|
67 | (24) |
|
|
|
|
|
|
67 | (1) |
|
|
68 | (2) |
|
4.3 System Model and Implementation |
|
|
70 | (6) |
|
4.3.1 Network Description |
|
|
70 | (1) |
|
4.3.2 Sensing and Transmission Analysis |
|
|
70 | (1) |
|
|
71 | (1) |
|
4.3.4 Mathematical Model Evaluation |
|
|
72 | (1) |
|
4.3.4.1 Effectual Throughput |
|
|
72 | (1) |
|
4.3.4.2 Interference Throughput |
|
|
73 | (1) |
|
4.3.4.3 Energy Efficiency |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (4) |
|
|
80 | (1) |
|
|
80 | (11) |
|
4.A.1 Proof of Optimum Power Transmission for HRC Device at Effectual State (z = 0) |
|
|
80 | (2) |
|
4.A.2 Proof of Optimum Power Transmission for HRC Device in Interference State (z = 1) |
|
|
82 | (1) |
|
4.A.3 Proof of Optimum Power Transmission for MRC Device at Effectual State (z = 0) |
|
|
83 | (1) |
|
4.A.4 Proof of Optimum Power Transmission for MRC Device in Interference State (z = 1) |
|
|
84 | (2) |
|
|
86 | (5) |
|
5 Overview of Resource Management for Wireless Ad Hoc Network |
|
|
91 | (34) |
|
|
|
|
91 | (9) |
|
5.1.1 Wired and Wireless Network Design Approach |
|
|
93 | (3) |
|
|
96 | (1) |
|
5.1.3 Spectrum of Wireless Ad Hoc Network |
|
|
97 | (1) |
|
5.1.4 Enabling and Networking Technologies |
|
|
98 | (2) |
|
5.1.5 Taxonomy of Wireless Ad Hoc Network (WANET) |
|
|
100 | (1) |
|
5.2 Mobile Ad Hoc Network (MANET) |
|
|
100 | (4) |
|
5.2.1 Introduction to MANET |
|
|
101 | (1) |
|
5.2.2 Common Characteristics of MANET |
|
|
102 | (1) |
|
|
102 | (1) |
|
5.2.4 Applications of MANET |
|
|
103 | (1) |
|
5.2.5 Major Issues of MANET |
|
|
104 | (1) |
|
5.3 Vehicular Ad Hoc Network (VANET) |
|
|
104 | (3) |
|
5.3.1 Introduction to VANET |
|
|
104 | (1) |
|
5.3.2 Common Features of VANET |
|
|
105 | (1) |
|
5.3.3 Pros, Cons, Applications |
|
|
106 | (1) |
|
5.4 Wireless Mesh Network (WMN) |
|
|
107 | (4) |
|
|
107 | (1) |
|
5.4.2 Common Traits of WMN |
|
|
108 | (1) |
|
5.4.3 WMN Open Issues and Research Challenges |
|
|
109 | (1) |
|
5.4.4 Performance Metrics |
|
|
109 | (1) |
|
5.4.5 Advantages and Disadvantages |
|
|
110 | (1) |
|
5.4.6 Prominent Areas and Challenges of WMN |
|
|
110 | (1) |
|
5.5 Wireless Sensor Network (WSN) |
|
|
111 | (2) |
|
|
111 | (1) |
|
5.5.2 Common Properties of WSN |
|
|
112 | (1) |
|
5.5.3 Benefits, Harms, and Usage of WSN |
|
|
112 | (1) |
|
5.6 Intelligent Resource Management Concerns in WANET |
|
|
113 | (6) |
|
5.6.1 Major Issues of WANET |
|
|
114 | (1) |
|
5.6.2 Challenges of MAC Protocols |
|
|
115 | (1) |
|
|
116 | (1) |
|
5.6.3.1 Challenges of Routing Protocols |
|
|
116 | (2) |
|
5.6.4 Energy and Battery Management |
|
|
118 | (1) |
|
5.7 Future Research Directions |
|
|
119 | (2) |
|
|
121 | (4) |
|
|
121 | (4) |
|
6 A Survey: Brain Tumor Detection Using MRI Image with Deep Learning Techniques |
|
|
125 | (14) |
|
|
|
|
125 | (1) |
|
|
126 | (4) |
|
6.2.1 Types of Medical Imaging |
|
|
126 | (2) |
|
6.2.2 MR Imaging as a Modality |
|
|
128 | (1) |
|
6.2.3 Types of Brain Tumor MR Imaging Modalities |
|
|
128 | (1) |
|
6.2.4 Suitable Technologies Before Machine Learning |
|
|
129 | (1) |
|
6.2.5 MRI Brain Image Segmentation |
|
|
130 | (1) |
|
|
130 | (3) |
|
6.4 Gaps and Observations |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (4) |
|
|
135 | (4) |
|
7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios |
|
|
139 | (28) |
|
|
|
|
139 | (2) |
|
7.2 Safety in Wireless Networks: Since 1G to 4G |
|
|
141 | (6) |
|
7.2.1 Safety in Non-IP Networks |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
7.2.4.1 Flashy System Traffic and Radio Visual Security Keys |
|
|
145 | (1) |
|
7.2.4.2 User Plane Integrity |
|
|
145 | (1) |
|
7.2.4.3 Authorized Network Security and Compliance with Subscriber Level Safety Policies |
|
|
145 | (1) |
|
7.2.5 Security in 5G and Beyond |
|
|
145 | (2) |
|
7.3 IoT Background and Requirements |
|
|
147 | (3) |
|
7.3.1 IoT and Its Characteristics |
|
|
147 | (1) |
|
7.3.2 Characteristics of IoT Infrastructure |
|
|
147 | (1) |
|
7.3.3 Characteristics of IoT Applications |
|
|
148 | (1) |
|
7.3.4 Expected Benefits of IoT Adoption for Organization |
|
|
149 | (1) |
|
7.3.4.1 Benefits Correlated to Big Data Created by IoT |
|
|
149 | (1) |
|
7.3.4.2 Benefits Interrelated to the Openness of IoT |
|
|
149 | (1) |
|
7.3.4.3 Benefits Related to the Linked Aspect of IoT |
|
|
150 | (1) |
|
7.4 Non 5G Standards Supporting IoT |
|
|
150 | (2) |
|
7.4.1 Bluetooth Low Energy |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
7.5 5G Advanced Security Model |
|
|
152 | (3) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
7.5.4 Integrated Safety Rule |
|
|
154 | (1) |
|
|
155 | (1) |
|
7.6 Safety Challenges and Resolution of Three-Tiers Structure of 5G Networks |
|
|
155 | (3) |
|
7.6.1 Heterogeneous Access Networks |
|
|
155 | (1) |
|
7.6.1.1 Safety Challenges |
|
|
155 | (1) |
|
7.6.1.2 Safety Resolutions |
|
|
156 | (1) |
|
|
156 | (1) |
|
7.6.2.1 Safety Challenges |
|
|
156 | (1) |
|
7.6.2.2 Safety Resolutions |
|
|
157 | (1) |
|
|
157 | (1) |
|
7.6.3.1 Safety Challenges |
|
|
157 | (1) |
|
7.6.3.2 Safety Resolutions |
|
|
157 | (1) |
|
7.7 Conclusion and Future Research Directions |
|
|
158 | (9) |
|
|
159 | (8) |
|
8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation Systems |
|
|
167 | (22) |
|
|
|
|
|
167 | (2) |
|
8.2 Intelligent Transport System |
|
|
169 | (3) |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
171 | (1) |
|
8.3 Blockchain Technology |
|
|
172 | (106) |
|
|
173 | (1) |
|
8.3.2 Types of Blockchain |
|
|
173 | (1) |
|
8.3.2.1 Public Blockchain |
|
|
173 | (1) |
|
8.3.2.2 Private Blockchain |
|
|
173 | (1) |
|
8.3.2.3 Federated Blockchain |
|
|
174 | (1) |
|
8.3.3 Consensus Mechanism |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
8.3.3.3 Delegated Proof of Stake |
|
|
175 | (1) |
|
8.3.3.4 Practical Byzantine Fault Tolerance |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
8.3.3.7 Proof of Activity |
|
|
176 | (1) |
|
|
176 | (1) |
|
8.3.5 Data Management and Its Structure |
|
|
177 | (1) |
|
8.4 Blockchain Assisted Intelligent Transportation System |
|
|
178 | (1) |
|
8.4.1 Security and Privacy |
|
|
178 | (1) |
|
8.4.2 Blockchain and Its Applications for Improving Security and Privacy |
|
|
178 | (1) |
|
8.4.3 ITS Based on Blockchain |
|
|
179 | (1) |
|
|
180 | (1) |
|
8.5 Future Research Perspectives |
|
|
180 | (2) |
|
8.5.1 Electric Vehicle Recharging |
|
|
180 | (1) |
|
8.5.2 Smart City Enabling and Smart Vehicle Security |
|
|
181 | (1) |
|
8.5.3 Deferentially-Privacy Preserving Solutions |
|
|
181 | (1) |
|
8.5.4 Distribution of Economic Profits and Incentives |
|
|
182 | (1) |
|
|
182 | (7) |
|
|
182 | (7) |
|
9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super Capacitors |
|
|
189 | (12) |
|
|
|
|
|
|
|
|
189 | (1) |
|
9.2 Super Capacitors and Electrode Materials |
|
|
190 | (2) |
|
|
191 | (1) |
|
9.3 Related Works in the Utilization of Agro-Waste for Energy Engineering Applications |
|
|
192 | (3) |
|
9.4 Inferences from Works Related with Utilization of Coconut, Rice Husk, and Pineapple Waste for Fabrication of Super Capacitor |
|
|
195 | (1) |
|
9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro-Waste |
|
|
195 | (2) |
|
|
197 | (4) |
|
|
197 | (1) |
|
|
197 | (4) |
|
10 Computational Intelligence Techniques for Optimization in Networks |
|
|
201 | (16) |
|
|
|
10.1 Introduction Focussing on Pedagogy of Impending Approach |
|
|
201 | (4) |
|
10.1.1 Security Challenges in Networks |
|
|
202 | (1) |
|
10.1.2 Attacks Vulnerability in Complex Networks |
|
|
203 | (2) |
|
|
205 | (2) |
|
10.3 Broad Area of Research |
|
|
207 | (4) |
|
|
208 | (2) |
|
|
210 | (1) |
|
10.4 Problem Identification |
|
|
211 | (1) |
|
10.5 Objectives of the Study |
|
|
211 | (1) |
|
10.6 Methodology to be Adopted |
|
|
212 | (1) |
|
10.7 Proposed/Expected Outcome of the Research |
|
|
212 | (5) |
|
|
213 | (4) |
|
11 R&D Export and ICT Regimes in India |
|
|
217 | (10) |
|
|
|
217 | (2) |
|
11.2 Artificial Intelligence the Uptake of Infrastructure Development |
|
|
219 | (3) |
|
11.3 Future Analysis and Conclusion |
|
|
222 | (5) |
|
|
225 | (2) |
|
12 Metaheuristics to Aid Energy-Efficient Path Selection in Route Aggregated Mobile Ad Hoc Networks |
|
|
227 | (18) |
|
|
|
|
|
|
|
227 | (2) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
12.4 Ant Colony Optimization |
|
|
229 | (3) |
|
12.4.1 Setting Parameters and Initializing Pheromone Trails |
|
|
230 | (1) |
|
12.4.2 Generating Solutions |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (4) |
|
12.5.1 Energy Efficient ACO Algorithm |
|
|
233 | (2) |
|
12.5.2 ACO-Aided Cluster Design and Head Selection |
|
|
235 | (1) |
|
12.5.3 ACO-Aided Route Aggregation |
|
|
236 | (1) |
|
12.5.4 ACO-Aided Energy: Efficient Path Selection |
|
|
236 | (1) |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
240 | (5) |
|
|
240 | (5) |
|
13 Knowledge Analytics in IOMT-MANET Through QoS Optimization for Sustainability |
|
|
245 | (16) |
|
|
|
|
|
245 | (2) |
|
|
247 | (1) |
|
13.3 Proposed Neoteric Nature Inspired IWD Algorithm for ZRP |
|
|
248 | (1) |
|
|
249 | (8) |
|
13.5 Conclusion and Future Work |
|
|
257 | (4) |
|
|
258 | (3) |
|
14 Appraise Assortment of IoT Security Optimization |
|
|
261 | (10) |
|
|
|
261 | (3) |
|
|
264 | (3) |
|
14.3 Analysis of Traditional Security Mechanisms in IOT |
|
|
267 | (2) |
|
14.4 Conclusion and Future Scope |
|
|
269 | (2) |
|
|
269 | (2) |
|
15 Trust-Based Hybrid Routing Approach for Securing MANET |
|
|
271 | (8) |
|
|
|
|
271 | (1) |
|
|
272 | (2) |
|
15.3 Gaps and Objectives from the Literature Review |
|
|
274 | (1) |
|
15.4 Methodology to be Adopted |
|
|
275 | (1) |
|
|
276 | (1) |
|
15.6 Conclusion and Future Scope |
|
|
277 | (2) |
|
|
277 | (2) |
|
16 Study of Security Issues on Open Channel |
|
|
279 | (4) |
|
|
|
|
|
|
279 | (1) |
|
|
279 | (1) |
|
16.2.1 Reconnaissance Attack |
|
|
279 | (1) |
|
|
280 | (1) |
|
16.2.3 Man-in-the-Middle Attack |
|
|
280 | (1) |
|
16.2.4 Denial of Services (DoS) |
|
|
280 | (1) |
|
16.3 Securing Wireless Transmissions |
|
|
280 | (1) |
|
16.3.1 Protecting the Confidentiality |
|
|
280 | (1) |
|
16.3.2 Protecting the Modification |
|
|
281 | (1) |
|
16.3.3 Preventing Interruption or Denial-of-Service Attack |
|
|
281 | (1) |
|
16.4 Proposed Model for Securing the Client Over the Channel |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
Index |
|
283 | |