Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements

Blockchain-Enabled Security and Privacy Schemes in IoT TechnologiesIntroduction and MotivationInternet of ThingsIoT ArchitectureDistinguishing IoT from Conventional NetworksBlockchain: An OverviewGenerations of BlockchainBlockchain 1.0: Bitcoin and CryptocurrencyBlockchain 2.0: Smart Contracts and EthereumBlockchain 3.0: Convergence toward Decentralized ApplicationsBlockchain 4.0: Seamless Integration with Industry 4.0IoT Architecture and Systemic ChallengesSensing Layer: Introduction and Challenges in End NodesThreat Based on Network LayerService-Layer Based ThreatsApplication Interface LayerCross-Layer ChallengesChallenge to Implementation of Blockchain in IoTAbsence of IoT-Centric Consensus ProtocolTransaction Validation RulesScalability ChallengesStorage CapacityInherent Latency BlockchainIoT Device Integration ChallengesProtection of Devices against Malware and Content Execution AttacksSecure and Synchronized Software UpdatesApplication of Blockchain in IoT SectorAutonomous Decentralized Peer-to-Peer TelemetryBlockchain-Enabled Security for Smart CitiesBlockchain-Enabled Smart Home ArchitectureBlockchain-Based Self-Managed VaNeTsSecurity and Privacy of DataConclusion and Future Scope of WorkReferencesApplication and Challenges of IoT in HealthcareIntroductionMedicine and TechnologyInformation Technology and MedicineMedical Equipment TechnologyTechnology and Medical ResearchD PrintingDigitization of Health RecordsGreater Patient careImproved Public healthEase of WorkflowLower Healthcare costsDisadvantages of EHRBig DataApplications of Big Data in HealthcareRemote Health MonitoringBenefits of Remote Health MonitoringChallenges of Remote Health MonitoringObstacles of Remote Health Monitoring UsageIs Not Accessible for EveryonePatients’ and Doctors’ SkepticismThe Necessity of Extra Custom Healthcare SoftwareUncertain ReliabilityDisadvantages of Using IoT in HealthcareЕxtremelyTime-consuming AdaptionTechnology DependentSusceptibility to Network HackersTechnical RequirementsRegulatory ConcernsScalabilityTime ConstraintsSecurityManaging IoT ObstaclesChallenges with Managing IoT TechnologiesIntegrating New Technologies into Existing EnvironmentsManaging Protocol ComplexityNetworking ChallengesBest Practices in the Era of IoTSecurity Threats of IoTVulnerabilityEasy ExposureThreatsInsecure Web InterfaceInsufficient AuthenticationsInsecure Network DevicesLack of Transport EncryptionPrivacy ConcernsInsecure Cloud InterfaceConclusionsReferences“IoT” : Bright Future in Healthcare IndustryIntroductionScope of IoTInformation AccumulationDevice IntegrationReal-Time AnalyticsApps and Method AbridgmentHealthcare IndustryBenefits of IoT in Healthcare IndustryInformation Agglomeration and ExaminationFollowing and CautionsRemote Medical AssistanceSimultaneous Reporting and MonitoringStart to Finish Availability and ModeratenessIoT and PatientsIoT and PhysiciansIoT and HospitalsIoT for Insurance CorporationsRedefining HealthcareSmart PillsTechnology of WCECapsuleInformation Recorder Belt/Smart WearableWorkstationSmart BedsFeatures of Smart BedSleep TrackingTemperature ControlAir ChambersApp IntegrationTechnology of Smart BedSensorAir SystemThree Operating ModesProgrammedPosition DetectionManualNetworkSmart WearableSmart WatchHow Wearable WorksRemote Health MonitoringTechnological ComponentsHow RPM WorksBenefits of Remote Patient MonitoringIoT-Enabled ApplicationsConclusionReferencesPutting Blockchain into PracticeWhat are We Trying to Solve?Some Useful DistinctionsDifference between Blockchain and CryptocurrencyPublic Versus PrivatePossible ApplicationsFinanceKnow Your CustomerCross-Border TransferSecurities TransactionsInternational TradeSmart ContractsPropertyHealthcareInsuranceSupply ChainGovernanceGovernment’s TakeSummary of IMC ReportReport of the Steering Committee on FinTech Related IssuesSuccess StoriesLaVis WineTReDS Bill DiscountingTravel InsuranceSweden Land RecordsChallengesDigitizationProperty Records CompleteNeed for ScaleCodersSmart ContractsDo it YourselfHyperLedgerBitcoinEthereum BlockchainGenerate a HashNotesObject Detection System with Image and Speech RecognitionIntroductionMethodologyArchitectureCircuit DiagramSpeech RecognitionTensor FlowProposed AlgorithmResults and DiscussionConclusionReferencesBlockchain Applications and ImplementationIntroductionWhat is Blockchain?History of BlockchainHow it is Developed/ImplementationEthereum Blockchain NetworkWhat is Ethereum?Is Ethereum the Future?Ethereum Transactions Trend ChartSolidity and Other TechnologiesApplications of BlockchainBlockchain in Online MarketingBlockchain and Machine LearningBlockchain and Decentralized Web NetworkWhy Blockchain is Taking over the InternetConclusionReferencesInternet of Things (IoT) Applications with Blockchain TechniqueIntroduction to the Internet of Things (IoT)What is IoT?Benefits of IoTExample of IoTApplications of Internet of Things (IoT)IoT as a Network of NetworksThe Future of IoTIntroduction of BlockchainWhat is Blockchain?Architecture of BlockchainGenesis BlockUnderstanding SHA256 HashApplication of BlockchainWireless 2.0—Integrated Networks on the BlockchainMesh Networks Solve a Particular ProblemBitcoinDifference between Bitcoin and BlockchainSecurity and Privacy-Enhancing Technologies for Blockchain and CryptocurrencyIntroductionRelated Work on Bitcoin Scalability Trade-OffSoft ForkHard ForkEfficiency ImprovementsEffective Attacks on BlockchainMan-in-the-Middle AttacksBit-Flipping AttacksSequence AttacksComplete Substitution AttacksInformation LeakageAttacks on Control SoftwareModification of FunctionalityPiracy AttacksBrute-Force Attacks on the BlockchainReverse EngineeringCounterfeitingHardware TrojansDouble Spending% AttackRace AttackFinney AttackVector76 AttackAlternative History AttackSelfish Mining AttackSystem HackingIllegal ActivitiesIdentity TheftPotential Defenses Against Security Threats on BlockchainComparisons and Results AnalysisDiscussion about Critical Infrastructures for Securing BlockchainConclusionsReferencesSecurity and Privacy in loT Neelamani Samal and Debasis CountiaInternet of Things (IoT) Security TechnologiesIoT Security for NetworksAuthentication Fixing for IoT Security IssuesIoT Security Technologies for Data EncryptionSecurity Analytics as a Dimension of IoT Security SolutionsIoT Security Technologies: Core Protection Methods (IoT API)How to Build Trust in IoTEnable Device AuthenticationEncryption to Protect DataBlockchain TechnologyDistributed Consensus AlgorithmsConsensus In Permissionless Blockchain SystemBitcoin ConsensusProof of Work (PoW)Proof of Stake (PoS)Consensus in Permissioned Blockchain SystemPaxosRaftByzantine Fault Tolerance and Its VariantSecurity AnalysisDecentralized AuthenticationUsing Decentralized AuthenticationReferencesGeospatial Data Classification using Sequential Pattern Mining with Modified Deep Learning ArchitectureIntroductionRelated WorksProblem DefinitionMethodologyExpected OutcomeReferencesStarring Role of Internet of Things (IoT) in the Field of Biomedical Peregrination for Modern SocietyIntroductionApplications of IoT in Medical DomainTreating CancerSmart Ceaseless Glucose Checking (CGM) and Insulin PensClosed-Circle Insulin ConveyanceAssociated InhalersIngestible SensorsThe Apple Watch Application that Screens DespondencyCoagulation TestingApple’s Research Kit and Parkinson’s AilmentADAMM Asthma ScreenApplications of IoT in Other DomainsSmart Waste ManagementSecurity ApplicationSmart Hospital BuildingOld-Age / Disable CareMedical and HealthcareSmart TransportationSmart Agriculture for Medicinal PlantSmart Infrastructure DeploymentEnvironment MonitoringLiving LabConclusionsReferences
Next >