ebook img

Security in Smart Cities: Models, Applications, and Challenges PDF

363 Pages·2019·12.26 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security in Smart Cities: Models, Applications, and Challenges

Lecture Notes in Intelligent Transportation and Infrastructure Series Editor: Janusz Kacprzyk Aboul Ella Hassanien Mohamed Elhoseny Syed Hassan Ahmed Amit Kumar Singh Editors Security in Smart Cities: Models, Applications, and Challenges Lecture Notes in Intelligent Transportation and Infrastructure Series editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warszawa, Poland Theseries“LectureNotesinIntelligentTransportationandInfrastructure”(LNITI) publishes new developments and advances in the various areas of intelligent transportationandinfrastructure.Theintentistocoverthetheory,applications,and perspectivesonthestate-of-the-artandfuturedevelopmentsrelevanttotopicssuchas intelligenttransportationsystems,smartmobility,urbanlogistics,smartgrids,critical infrastructure, smart architecture, smart citizens, intelligent governance, smart architecture and construction design, as well as green and sustainable urban structures.Theseriescontainsmonographs,conferenceproceedings,editedvolumes, lecture notes and textbooks. Of particular value to both the contributors and the readershiparetheshortpublicationtimeframeandtheworld-widedistribution,which enablewideandrapiddisseminationofhigh-qualityresearchoutput. More information about this series at http://www.springer.com/series/15991 Aboul Ella Hassanien Mohamed Elhoseny (cid:129) Syed Hassan Ahmed Amit Kumar Singh (cid:129) Editors Security in Smart Cities: Models, Applications, and Challenges 123 Editors AboulElla Hassanien SyedHassan Ahmed Faculty of Computers andInformation Department ofComputer Science CairoUniversity Georgia SouthernUniversity, Giza, Egypt Statesboro Campus Statesboro, GA,USA MohamedElhoseny Faculty of Computers andInformation Amit KumarSingh MansouraUniversity Department ofComputer Science Dakahlia, Egypt andEngineering National Institute ofTechnology Patna, PatnaUniversity Campus Patna, Bihar, India ISSN 2523-3440 ISSN 2523-3459 (electronic) Lecture Notesin Intelligent Transportation andInfrastructure ISBN978-3-030-01559-6 ISBN978-3-030-01560-2 (eBook) https://doi.org/10.1007/978-3-030-01560-2 LibraryofCongressControlNumber:2018958489 ©SpringerNatureSwitzerlandAG2019 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface DuetotheincreaseinInternetofThings(IoT)applicationsize,complexity,andthe numberofcomponents,itisnolongerpracticaltoanticipateandsecureallpossible interactions and data processing in these applications using the traditional infor- mationsecuritymodels.Theemergingofnewengineeringresearchareasisaclear evidenceoftheemergenceofnewdemandsandrequirementsofIoTapplicationsto be more secure. The IoT offers advanced connectivity of devices, systems, and services that go beyond machine-to-machine communications and covers a variety ofdomainsandapplications.Theinterconnectionofembeddeddevicesisexpected inmanyfieldsincludingMobilityandIntelligentTransport.Itisbeingpromotedby thesoftwareengineeringcommunitytousesuchsystemsastheadequatesolutionto handle the current requirements of complex big data processing problems that demanding distribution, flexibility, and robustness. However, information security ofsuchsystemsisstillontheflyabigchallenge.Themainobjectiveofthisbookis to provide an exhaustivereviewon the challenges of informationsecurityin smart andintelligentapplications,especiallythoseareworkinginbigdataenvironments. In addition, it aims to provide a collection of high-quality research works that address broad challenges in both theoretical and application aspects of intelligent andsmartreal-lifeapplications.Thisbookcontainsasetofchaptersthatstimulates thecontinuingeffortontheapplicationofthebigdataprocessingthatleadstosolve the problem of big data processing in smart cities applications. Inthisbook,wepresenttheconceptsassociatedwith secureIoTapplicationsin three distinct parts. 1. Part I discusses the challenges surrounding the IoT-based healthcare applica- tions.Thispartaimstoprovideaclearviewaboutthefundamentalconceptsfor buildingasecuredatatransmissionforhealthcareserviceapplications.Itcontains five chapters. 2. Part II discusses different security models for IoT applications in smart cities. This part includes five chapters. v vi Preface 3. Part III discusses the applications of secure network communications in smart IoTapplications.Differenttopicsarecoveredinthatpartandarewellpresented in five chapters to ensure the context is simple for understanding. Giza, Egypt Aboul Ella Hassanien Dakahlia, Egypt Mohamed Elhoseny Statesboro, USA Syed Hassan Ahmed Patna, India Amit Kumar Singh Springer 2018 Contents Part I Challenges of Smart Healthcare Applications Big Data Challenges and Opportunities in Healthcare Informatics and Smart Hospitals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Mohammed K. Hassan, Ali I. El Desouky, Sally M. Elghamrawy and Amany M. Sarhan Healthcare Analysis in Smart Big Data Analytics: Reviews, Challenges and Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Ahmed Ismail, Abdulaziz Shehab and I. M. El-Henawy Realization of an Adaptive Data Hiding System for Electronic Patient Record, Embedding in Medical Images . . . . . . . . . . . . . . . . . . . 47 Shabir A. Parah, Ifshan Ahmad, Nazir A. Loan, Khan Muhammad, Javaid A. Sheikh and G. M. Bhat A Swarm Intelligence Model for Enhancing Health Care Services in Smart Cities Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Ahmed Abdelaziz, Ahmed S. Salama and A. M. Riad A Machine Learning Model for Predicting of Chronic Kidney Disease Based Internet of Things and Cloud Computing in Smart Cities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Ahmed Abdelaziz, Ahmed S. Salama, A. M. Riad and Alia N. Mahmoud Part II Secure Models for Smart Cities Applications Data Security and Challenges in Smart Cities . . . . . . . . . . . . . . . . . . . . 117 I. S. Farahat, A. S. Tolba, Mohamed Elhoseny and Waleed Eladrosy Engineering Large Complex Critical Infrastructures of Future Smart Cities as Self-adaptive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Hosny Abbas, Samir Shaheen and Mohammed Amin vii viii Contents Security Challenges in IoT Cyber World . . . . . . . . . . . . . . . . . . . . . . . . 171 Chintan Patel and Nishant Doshi Blockchains for Smart Cities: A Survey. . . . . . . . . . . . . . . . . . . . . . . . . 193 Ahmed G. Ghandour, Mohamed Elhoseny and Aboul Ella Hassanien Cryptanalysis of 4-Bit Crypto S-Boxes in Smart Applications . . . . . . . . 211 Sankhanil Dey and Ranjan Ghosh Part III Secure Network Communication in Smart Cities Applications A Robust Watermarking Scheme Using Machine Learning Transmitted Over High-Speed Network for Smart Cities. . . . . . . . . . . . 257 Ankur Rai and Harsh Vikram Singh 4, 8, 32, 64 Bit Substitution Box Generation Using Irreducible or Reducible Polynomials Over Galois Field GF(Pq) for Smart Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Sankhanil Dey and Ranjan Ghosh Local Binary Patterns Based Facial Expression Recognition for Efficient Smart Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Swati Nigam, Rajiv Singh and A. K. Misra Efficient Generation of Association Rules from Numeric Data Using Genetic Algorithm for Smart Cities . . . . . . . . . . . . . . . . . . . . . . . 323 Pardeep Kumar and Amit Kumar Singh Online User Authentication System Based on Finger Knuckle Print Using Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Atrab A. Abd El-aziz, Eman M. EL-daydamony, Alaa. M. Raid and Hassan H. Soliman Part I Challenges of Smart Healthcare Applications

Description:
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially fo
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.