Preface xv Acknowledgement xvii 1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks 1 Hemanta Kumar Palo and Limali Sahoo 1.1 Introduction 1 1.2 The IoT Scenario 2 1.3 The IoT Domains 3 1.3.1 The IoT Policy Domain 3 1.3.2 The IoT Software Domain 5 1.
3.2.1 IoT in Cloud Computing (CC) 5 1.3.2.2 IoT in Edge Computing (EC) 6 1.3.2.
3 IoT in Fog Computing (FC) 10 1.3.2.4 IoT in Telecommuting 11 1.3.2.5 IoT in Data-Center 12 1.3.
2.6 Virtualization-Based IoT (VBIoT) 12 1.4 Green Computing (GC) in IoT Framework 12 1.5 Semantic IoT (SIoT) 13 1.5.1 Standardization Using oneM2M 15 1.5.2 Semantic Interoperability (SI) 18 1.
5.3 Semantic Interoperability (SI) 19 1.5.4 Semantic IoT vs Machine Learning 20 1.6 Conclusions 21 References 21 2 Measures for Improving IoT Security 25 Richa Goel, Seema Sahai, Gurinder Singh and Saurav Lall 2.1 Introduction 25 2.2 Perceiving IoT Security 26 2.3 The IoT Safety Term 27 2.
4 Objectives 28 2.4.1 Enhancing Personal Data Access in Public Repositories 28 2.4.2 Develop and Sustain Ethicality 28 2.4.3 Maximize the Power of IoT Access 29 2.4.
4 Understanding Importance of Firewalls 29 2.5 Research Methodology 30 2.6 Security Challenges 31 2.6.1 Challenge of Data Management 32 2.7 Securing IoT 33 2.7.1 Ensure User Authentication 33 2.
7.2 Increase User Autonomy 33 2.7.3 Use of Firewalls 34 2.7.4 Firewall Features 35 2.7.5 Mode of Camouflage 35 2.
7.6 Protection of Data 35 2.7.7 Integrity in Service 36 2.7.8 Sensing of Infringement 36 2.8 Monitoring of Firewalls and Good Management 36 2.8.
1 Surveillance 36 2.8.2 Forensics 37 2.8.3 Secure Firewalls for Private 37 2.8.4 Business Firewalls for Personal 37 2.8.
5 IoT Security Weaknesses 37 2.9 Conclusion 37 References 38 3 An Efficient Fog-Based Model for Secured Data Communication 41 V. Lakshman Narayana and R. S. M. Lakshmi Patibandla 3.1 Introduction 41 3.1.
1 Fog Computing Model 42 3.1.2 Correspondence in IoT Devices 43 3.2 Attacks in IoT 45 3.2.1 Botnets 45 3.2.2 Man-In-The-Middle Concept 45 3.
2.3 Data and Misrepresentation 46 3.2.4 Social Engineering 46 3.2.5 Denial of Service 46 3.2.6 Concerns 47 3.
3 Literature Survey 48 3.4 Proposed Model for Attack Identification Using Fog Computing 49 3.5 Performance Analysis 52 3.6 Conclusion 54 References 54 4 An Expert System to Implement Symptom Analysis in Healthcare 57 Subhasish Mohapatra and Kunal Anand 4.1 Introduction 57 4.2 Related Work 59 4.3 Proposed Model Description and Flow Chart 60 4.3.
1 Flowchart of the Model 60 4.3.1.1 Value of Symptoms 60 4.3.1.2 User Interaction Web Module 60 4.3.
1.3 Knowledge-Base 60 4.3.1.4 Convolution Neural Network 60 4.3.1.5 CNN-Fuzzy Inference Engine 61 4.
4 UML Analysis of Expert Model 62 4.4.1 Expert Module Activity Diagram 63 4.4.2 Ontology Class Collaboration Diagram 65 4.5 Ontology Model of Expert Systems 66 4.6 Conclusion and Future Scope 67 References 68 5 An IoT-Based Gadget for Visually Impaired People 71 Prakash, N., Udayakumar, E.
, Kumareshan, N., Srihari, K. and Sachi Nandan Mohanty 5.1 Introduction 71 5.2 Related Work 73 5.3 System Design 74 5.4 Results and Discussion 82 5.5 Conclusion 84 5.
6 Future Work 84 References 84 6 IoT Protocol for Inferno Calamity in Public Transport 87 Ravi Babu Devareddi, R. Shiva Shankar and Gadiraju Mahesh 6.1 Introduction 87 6.2 Literature Survey 89 6.3 Methodology 94 6.3.1 IoT Message Exchange With Cloud MQTT Broker Based on MQTT Protocol 98 6.3.
2 Hardware Requirement 98 6.4 Implementation 103 6.4.1 Interfacing Diagram 105 6.5 Results 106 6.6 Conclusion and Future Work 108 References 109 7 Traffic Prediction Using Machine Learning and IoT 111 Daksh Pratap Singh and Dolly Sharma 7.1 Introduction 111 7.1.
1 Real Time Traffic 111 7.1.2 Traffic Simulation 112 7.2 Literature Review 112 7.3 Methodology 113 7.4 Architecture 116 7.4.1 API Architecture 117 7.
4.2 File Structure 117 7.4.3 Simulator Architecture 118 7.4.4 Workflow in Application 122 7.4.5 Workflow of Google APIs in the Application 122 7.
5 Results 122 7.5.1 Traffic Scenario 122 7.5.1.1 Low Traffic 124 7.5.1.
2 Moderate Traffic 124 7.5.1.3 High Traffic 125 7.5.2 Speed Viewer 125 7.5.3 Traffic Simulator 126 7.
5.3.1 1st View 126 7.5.3.2 2nd View 128 7.5.3.
3 3rd View 128 7.6 Conclusion and Future Scope 128 References 129 8 Application of Machine Learning in Precision Agriculture 131 Ravi Sharma and Nonita Sharma 8.1 Introduction 131 8.2 Machine Learning 132 8.2.1 Supervised Learning 133 8.2.2 Unsupervised Learning 133 8.
2.3 Reinforcement Learning 134 8.3 Agriculture 134 8.4 ML Techniques Used in Agriculture 135 8.4.1 Soil Mapping 135 8.4.2 Seed Selection 140 8.
4.3 Irrigation/Water Management 141 8.4.4 Crop Quality 143 8.4.5 Disease Detection 144 8.4.6 Weed Detection 145 8.
4.7 Yield Prediction 147 8.5 Conclusion 148 References 149 9 An IoT-Based Multi Access Control and Surveillance for Home Security 153 Yogeshwaran, K., Ramesh, C., Udayakumar, E., Srihari, K. and Sachi Nandan Mohanty 9.1 Introduction 153 9.
2 Related Work 155 9.3 Hardware Description 156 9.3.1 Float Sensor 158 9.3.2 Map Matching 158 9.3.3 USART Cable 159 9.
4 Software Design 161 9.5 Conclusion 162 References 162 10 Application of IoT in Industry 4.0 for Predictive Analytics 165 Ahin Banerjee, Debanshee Datta and Sanjay K. Gupta 10.1 Introduction 165 10.2 Past Literary Works 168 10.2.1 Maintenance-Based Monitoring 168 10.
2.2 Data Driven Approach to RUL Finding in Industry 169 10.2.3 Philosophy of Industrial-IoT Systems and its Advantages in Different Domain 173 10.3 Methodology and Results 176 10.4 Conclusion 179 References 180 11 IoT and Its Role in Performance Enhancement in Business Organizations 183 Seema Sahai, Richa Goel, Parul Bajaj and Gurinder Singh 11.1 Introduction 183 11.1.
1 Scientific Issues in IoT 184 11.1.2 IoT in Organizations 185 11.1.3 Technology and Business 187 11.1.4 Rewards of Technology in Business 187 11.1.
5 Shortcomings of Technology in Business 188 11.1.6 Effect of IoT on Work and Organization 188 11.2 Technology and Productivity 190 11.3 Technology and Future of Human Work 193 11.4 Technology and Employment 194 11.5 Conclusion 195 References 195 12 An Analysis of Cloud Computing Based on Internet of Things 197 Farhana Ajaz, Mohd Naseem, Ghulfam Ahamad, Sparsh Sharma and Ehtesham Abbasi 12.1 Introduction 197 12.
1.1 Generic Architecture 199 12.2 Challenges in IoT 202 12.3 Technologies Used in IoT 203 12.4 Cloud Computing 203 12.4.1 Service Models of Cloud Computing 204 12.5 Cloud Computing Characteristics 205 12.
6 Applications of Cloud Computing 206 12.7 Cloud IoT 207 12.8 Necessity for Fusing IoT and Cloud Computing 207 12.9 Cloud-Based IoT Architecture 208 12.10 Applications of Cloud-Based IoT 208 12.11 Conclusion 209 References 209 13 Importance of Fog Computing in Emerging Technologies-IoT 211 Aarti Sahitya 13.1 Introduction 211 13.2 IoT Core 212 13.
3 Need of Fog Computing 227 References 230 14 Convergence of Big Data and Cloud Computing Environment 233 Ranjan Ganguli 14.1 Introduction 233 14.2 Big Data: Historical View 234 14.2.1 Big Data: Definition 235 14.2.2 Big Data Classification 236 14.2.
3 Big Data Analytics 236 14.3 Big Data Challenges 237 14.4 The Architecture 238 14.4.1 Storage or Collection System 240 14.4.2 Data Care 240 14.4.
3 Analysis 240 14.5 Cloud Computing: History in a Nutshell 241 14.5.1 View on Cloud Computing and Big Data 241 14.6 Insight of Big Data and Cloud Computing 241 14.6.1 Cloud-Based Services 242 14.6.
2 At a Glance: Cloud Services 244 14.7 Cloud Framework 245 14.7.1 Hadoop 245 14.7.2 Cassandra 246 14.7.2.
1 Features of Cassandra 246 14.7.3 Voldemort 247 14.7.3.1 A Comparison With Relational Databases and Benefits 247 14.8 Conclusions 248 14.9 Future Perspective 248 References 248 15 Data Analytics Framework Based on Cloud Environment 251 K.
Kanagaraj and S. Geetha 15.1 Introduction 251 15.2 Focus Areas of the Chapter 252 15.3 Cloud Computing 252 15.3.1 Cloud Service Models 253 15.3.
1.1 Software as a Service (SaaS) 253 15.3.1.2 Platform as a Service (PaaS) 254 15.3.1.3 Infrastructure as a Service (IaaS) 255 15.
3.1.4 Desktop as a Service (DaaS) 256 15.3.1.5 Analytics as a Service (AaaS) 257