Intro
Security and Privacy Issues in IoT Devices and Sensor Networks
Copyright
Contents
Contributors
Chapter 1: Wireless sensor networks: Concepts, components, and challenges
1. Introduction
1.1. Network design objective
1.2. Technological background
1.3. Network architecture
1.4. Classification of WSN
2. WSN communication pattern
2.1. Protocol stack of WSN
2.2. Medium access control at data link layer
2.3. Network layer
2.3.1. Routing protocol
2.4. Transport layer
3. WSN design challenges
2.4. Hotspot preventing routing (HPR)
2.5. RAIN
2.6. Thermal-aware shortest hop routing protocol (TSHR)
2.7. M-ATTEMPT
2.8. TMQoS
2.9. RE-ATTEMPT
2.10. M2E2 multihop routing protocol
2.11. Thermal aware-localized QoS routing protocol
2.12. Trust and thermal-aware routing protocol
2.13. Self-healing thermal-aware RPL routing protocol
2.14. Multipath ring routing protocol
3. Introduction about the thermal influence on medical WSN
3.1. Problems faced by recent scenario
3.2. Thermal influence on human tissue
3. Related work
4. Proposed work
4.1. Sensor communication between the sensor nodes
4.2. Encryption and decryption
4.3. Secure communication between sensor head to remote server
4.4. Secure data access in cloud server
5. Performance analysis
6. Summary
References
Chapter 4: Impact of thermal effects on wireless body area networks and routing strategies
1. Introduction
2. Thermal-aware routing protocols
2.1. Thermal-aware routing algorithm (TARA)
2.2. Least temperature rise (LTR)
2.3. Least total route temperature (LTRT)
4. Comparative analysis of optimized clustering algorithm
4.1. Cluster formation scenario
4.2. Optimized clustering strategy
5. Evaluation of clustering methods for optimization
5.1. Modeling of system
6. Result and analysis
7. Conclusion and future work
References
Chapter 2: Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access
1. Brief history of IoT communications related to multiple access technique
2. Basic fundamentals of NOMA
3. NOMA and application in cooperation network
4. NOMA and cognitive radio-assisted IoT system
4.1. System model of IoT relying NOMA and CR
4.2. Outage probability analysis in case of partial relay selection
4.2.1. Performance analysis of the first user
4.2.2. Outage probability at D2
5. Improving security at physical layer
6. Validating achievable expressions of outage behavior and secure performance via numerical simulation
7. Conclusion
References
Chapter 3: Security and privacy in wireless body sensor networks using lightweight cryptography scheme
1. Introduction
2. Motivation and objective of research