Internet of Things in Business Transformation Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106 Publishers at Scrivener Martin Scrivener ([email protected]) Phillip Carmical ([email protected]) Scrivener Publishing 100 Cummings Center, Suite 541J Beverly, MA 01915-6106 Publishers at Scrivener Martin Scrivener ([email protected]) Internet of Things in Phillip Carmical ([email protected]) Business Transformation Developing an Engineering and Business Strategy for Industry 5.0 Edited by Parul Gandhi, Surbhi Bhatia, Abhishek Kumar, Mohammad Alojail and Pramod Singh Rathore This edition first published 2021 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA © 2021 Scrivener Publishing LLC For more information about Scrivener publications please visit www.scrivenerpublishing.com. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other- wise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions. Wiley Global Headquarters 111 River Street, Hoboken, NJ 07030, USA For details of our global editorial offices, customer services, and more information about Wiley prod- ucts visit us at www.wiley.com. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no rep- resentations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant- ability or fitness for a particular purpose. No warranty may be created or extended by sales representa- tives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further informa- tion does not mean that the publisher and authors endorse the information or services the organiza- tion, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Library of Congress Cataloging-in-Publication Data ISBN 978-1-119-71112-4 Cover image: Pixabay.com Cover design by Russell Richardson Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines Printed in the USA 10 9 8 7 6 5 4 3 2 1 Contents Preface xiii 1 Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products 1 Pragyadiya Das 1.1 Introduction 1 1.2 Industrial Internet of Things 3 1.3 Pipeline Leaks 3 1.3.1 Various Techniques used to Detect Pipeline Leak 4 1.3.2 Use of IIoT to Detect Pipeline Leak 7 1.3.3 Use of Machine Learning Algorithms to Detect Pipeline Leak 9 1.3.4 Design and Analysis of Ensemble Learning-Based Approach for Pipeline Leak Detection 10 1.4 Conclusion 11 References 11 2 Heart Rate Monitoring System 15 Ramapriya Ranganath, Parag Jain, Akarash Kolekar, Sneha Baliga, A. Srinivas and M. Rajasekar 2.1 Introduction 16 2.2 Project Objectives 17 2.3 System Architecture 18 2.4 Conclusion 25 References 25 3 An Efficient Clustering Technique for Wireless Body Area Networks Based on Dragonfly Optimization 27 Bilal Mehmood and Farhan Aadil 3.1 Introduction 28 3.2 Literature Review 29 v vi Contents 3.3 Clustering Technique 31 3.3.1 Evolutionary Algorithms 32 3.4 Implementation Steps 34 3.4.1 Dragonfly Algorithm 35 3.5 Result and Simulations 37 3.6 Conclusion 41 References 41 4 Transformational Technology for Business Transformation in the New Era 43 Md Shamsul Haque Ansari and Monica Mehrotra 4.1 Introduction 43 4.1.1 Business Transformation 45 4.2 Digital Transformation and its Big Trend 46 4.2.1 Digital Transformation 46 4.2.2 How Important is Digital Transformation? 46 4.2.3 Digital Transformation Examples 48 4.2.4 Importance of Digital Transformation 50 4.2.5 Digital Transformation vs Business Transformation 50 4.2.6 What Does Digital Transformation Look Like? 50 4.3 Transformational Technology 51 4.3.1 Internet of Things 51 4.3.2 Robotic Process Automation 52 4.3.3 Automation and Artificial Intelligence 52 4.3.4 Blockchain 53 4.3.5 Cloud Computing 54 4.3.6 Smartphones and Mobile Apps 54 4.3.7 4G and 5G 55 4.3.8 Data Analytics 55 4.3.9 Social Media 55 4.4 How to Get “Digital Transformation” in a Right Way for Any Business 56 4.4.1 Look Beyond the Traditional Enterprise Firewall 56 4.4.2 Bring New Ideas From the Edge to the Core 57 4.4.3 Define the Role of the CIO in the Innovation Process 57 4.5 Relevance of IoT in Digital Transformation 58 4.6 Conclusion 59 References 59 Contents vii 5 Future of Artificial Intelligence: Will People be at More of an Advantage Than They Are Today? 61 Priyadarsini Patnaik and Ravi Prakash 5.1 Introduction 61 5.2 The State of Artificial Intelligence (AI) 63 5.3 How Do Customers Interact with AI Nowadays? 63 5.4 AI as Digital Assistants 63 5.5 AI and Privacy, Data Security 64 5.5.1 Artificial Intelligence and its Effect on Humans 64 5.5.2 Conclusion 67 References 67 6 Classifier for DDoS Attack Detection in Software Defined Networks 71 Gaganjot Kaur and Prinima Gupta 6.1 Introduction 72 6.2 Related Work 75 6.3 DDoS Attacks Overview 79 6.4 Types of DDoS Attacks 81 6.5 DDoS Detection Techniques in SDN 83 6.6 Detection Using ML Techniques 83 6.7 Proposed Work Using SVM Classifier 84 6.8 Data Set Used 85 6.9 Proposed Methodology 85 6.10 Existing & Proposed Results 86 6.11 Conclusion & Future Work 86 References 87 7 IoT-Based Optimized and Secured Ecosystem for Energy Internet: The State-of-the-Art 91 Shilpa Sambhi, Shikhar Sambhi and Vikas Singh Bhadoria 7.1 Introduction 92 7.2 Distinguishing Features Between Home Automation and Smart Home 95 7.3 Energy Generation Shift Towards Renewable Sources 99 7.4 Robust Energy Management with IoT Technology 100 7.5 Solution from IoT Technology for Secured Transactions 103 7.5.1 Category I: Centralized Approach 103 7.5.2 Category II: Decentralized Approach 103 7.5.2.1 Blockchain Technology 104 7.5.2.2 Software Defined Networking (SDN) 107 viii Contents 7.6 Role of IoT in Smart Grid 109 7.6.1 Power Generation 109 7.6.2 Power Transmission 111 7.6.3 Power Distribution 111 7.6.4 Consumer Consumption 112 7.7 Bottleneck Areas of Existing System 112 7.8 Fusion of Energy Internet with IoT and Blockchain 113 7.9 Challenges for Safe and Secured Ecosystem in Energy Internet 116 7.9.1 The Case of Smart Grids 117 7.9.2 The Case of Smart Cities 119 References 121 8 A Novel Framework for Intelligent Spaces 127 Deepali Kamthania 8.1 Introduction 127 8.2 Intelligent Space 128 8.2.1 Sensing 128 8.2.2 Multimodal Perception 129 8.2.3 Context-Based Data Interpretation 129 8.2.4 Narrative Engines 129 8.3 Product Identification 130 8.4 Position Measurements 131 8.5 Proposed Framework 134 8.6 Conclusions 136 References 136 9 Defense and Isolation in the Internet of Things 141 Ravi Kumar Sharma, Tejinder Pal Singh Brar and Parul Gandhi 9.1 Introduction 142 9.1.1 IoT Reference Model 143 9.1.2 IoT Security Threats 144 9.1.3 IoT Security Requirements 145 9.1.3.1 Scale 146 9.1.3.2 IP Protocol-Based IoT 146 9.1.3.3 Heterogeneous IoT 147 9.1.3.4 Lightweight Security 147 9.2 IoT Security Overview 149 9.2.1 IoT Protocols 149 9.2.2 Network and Transport Layer Challenges 152 9.2.3 IoT Gateways and Security 152 9.2.4 IoT Routing Attacks 153