ISBN-13: 9781119768784 / Angielski / Twarda / 2022 / 288 str.
ISBN-13: 9781119768784 / Angielski / Twarda / 2022 / 288 str.
Preface xiii1 Face Recognition-Based Surveillance System: A New Paradigm for Criminal Profiling 1Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain1.1 Introduction 11.2 Image Processing 61.3 Deep Learning 71.3.1 Neural Network 91.3.2 Application of Neural Network in Face Recognition 101.4 Methodology 101.4.1 Face Recognition 101.4.2 Open CV 111.4.3 Block Diagram 111.4.4 Essentials Needed 121.4.5 Website 121.4.6 Hardware 121.4.7 Procedure 121.5 Conclusion 16References 172 Smart Healthcare Monitoring System: An IoT-Based Approach 19Paranjeet Kaur2.1 Introduction 192.2 Healthcare at Clinics 212.3 Remote Healthcare 212.4 Technological Framework 212.5 Standard UIs, Shows, and User Requirements 232.5.1 Advantages 232.5.2 Application 232.6 Cloud-Based Health Monitoring Using IoT 242.7 Information Acquisition 242.8 The Processing of Cloud 252.9 IoT-Based Health Monitoring Using Raspberry Pi 252.10 IoT-Based Health Monitoring Using RFID 262.10.1 Sensor Layer 272.10.2 Network Layer 282.10.3 Service Layer 282.11 Arduino and IoT-Based Health Monitoring System 282.12 IoT-Based Health Monitoring System Using ECG Signal 292.12.1 System Model 302.12.2 Framework 302.13 IoT-Based Health Monitoring System Using Android App 312.13.1 Transferring the Information to the Cloud 332.13.2 Application Controls 332.14 Conclusion and Future Perspectives 33References 343 Design of Gesture-Based Hand Gloves Using Arduino UNO: A Grace to Abled Mankind 37Harpreet Singh Bedi, Dekkapati Vinit Raju, Nandyala Meghanath Reddy C. Partha Sai Kumar and Mandla Ravi Varma3.1 Introduction 383.1.1 Block Diagram 383.1.2 The Proposed New Design 393.1.3 Circuit Diagram 403.2 Result and Discussion 403.2.1 Data Analysis 413.3 Conclusion 413.4 Future Scope 42References 424 Playing With Genes: A Pragmatic Approach in Genetic Engineering 45Prerna Singh and Dolly Sharma4.1 Introduction 464.2 Literature Review 474.3 Methodology 484.3.1 Plasmid Method 484.3.2 The Vector Method 494.3.3 The Biolistic Method 494.4 Food and Agriculture 504.5 Impact on Farmers 534.6 Diseases: Gene Editing and Curing 544.7 Conclusion 564.8 Future Scope 56References 575 Digital Investigative Model in IoT: Forensic View 59Suryapratap Ray and Tejasvi Bhatia5.1 Introduction 595.1.1 Artificial Neural Network 605.2 Application of AI for Different Purposes in Forensic Science 615.2.1 Artificial Intelligence for Drug Toxicity and Safety 615.2.2 Crime Scene Reconstruction 625.2.3 Sequence or Pattern Recognition 625.2.4 Repositories Building 635.2.5 Establishment of Connection Among the Investigating Team 635.2.6 Artificial Intelligence and Expert System in Mass Spectrometry 635.2.7 AI in GPS Navigation 655.3 Future of AI 665.4 Challenges While Implementing AI 675.4.1 Unexplainability of AI 675.4.2 AI Anti-Forensics 675.4.3 Connection Interruption Between the Cyber Forensics and AI Communities 675.4.4 Data Analysis and Security 685.4.5 Creativity 685.5 Conclusion 68References 696 Internet of Things Mobility Forensics 73Shipra Rohatgi, Aman Sharma and Bhavya Sharma6.1 Introduction 746.2 Smart Device and IoT 756.3 Relation of Internet of Things with Mobility Forensics 766.3.1 Cyber Attack on IoT Data 776.3.2 Data Recovery from IoT Devices 786.3.3 Scenario-Based Analysis of IoT Data as Evidence 796.4 Mobility Forensics IoT Investigation Model 806.5 Internet of Things Mobility Forensics: A Source of Information 826.6 Drawbacks in IoT Devices Data Extraction 826.7 Future Perspective of Internet of Things Mobility Forensics 846.8 Conclusion 84References 857 A Generic Digital Scientific Examination System for Internet of Things 87Shipra Rohatgi and Sakshi Shrivastava7.1 Introduction 887.2 Internet of Things 897.3 IoT Architecture 917.4 Characteristics of IoT 927.5 IoT Security Challenges and Factors of Threat 947.5.1 Effects of IoT Security Breach 957.6 Role of Digital Forensics in Cybercrime Investigation for IoT 967.6.1 IoT in Digital Forensic 967.6.2 Digital Forensics Investigation Framework for IoT Devices 987.6.3 Road Map for Issues in IoT Forensics 997.7 IoT Security Steps 1027.7.1 How to Access IoT Security 1037.8 Conclusion 107References 1088 IoT Sensors: Security in Network Forensics 111D. Karthika8.1 Introduction 1118.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 1128.3 The IoT of the Future and the Need to Secure 1148.3.1 The Future--Cognitive Systems and the IoT 1148.4 Security Engineering for IoT Development 1158.5 Building Security Into Design and Development 1158.6 Security in Agile Developments 1168.7 Focusing on the IoT Device in Operation 1178.8 Cryptographic Fundamentals for IoT Security Engineering 1188.8.1 Types and Uses of Cryptographic Primitives in the IoT 1188.8.1.1 Encryption and Decryption 1198.8.1.2 Symmetric Encryption 1208.8.1.3 Asymmetric Encryption 1218.8.1.4 Hashes 1228.8.1.5 Digital Signatures 1238.8.1.6 Symmetric (MACS) 1238.8.1.7 Random Number Generation 1248.8.1.8 Cipher Suites 1258.9 Cloud Security for the IoT 1258.9.1 Asset/Record Organization 1268.9.2 Service Provisioning, Billing, and Entitlement Management 1268.9.3 Real-Rime Monitoring 1268.9.4 Sensor Coordination 1278.9.5 Customer Intelligence and Marketing 1278.9.6 Information Sharing 1278.9.7 Message Transport/Broadcast 1288.10 Conclusion 128References 1299 Xilinx FPGA and Xilinx IP Cores: A Boon to Curb Digital Crime 131B. Khaleelu Rehman, G. Vallathan, Vetriveeran Rajamani and Salauddin Mohammad9.1 Introduction 1329.2 Literature Review 1329.3 Proposed Work 1329.4 Xilinx IP Core Square Root 1369.5 RTL View of the 8-Bit Multiplier 1409.5.1 Eight-Bit Multiplier Simulation Results Using IP Core 1449.6 RTL View of 8-Bit Down Counter 1459.6.1 Eight-Bit Down Counter Simulation Results 1459.7 Up/Down Counter Simulation Results 1499.8 Square Root Simulation Results 1509.9 Hardware Device Utilization Reports of Binary Down Counter 1549.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 1569.10.1 Power Analysis of Binary Up/Down Counter 1599.11 Conclusion 160References 16010 Human-Robot Interaction: An Artificial Cognition-Based Study for Criminal Investigations 163Deepansha Adlakha and Dolly Sharma10.1 Introduction 16410.1.1 Historical Background 16510.2 Methodology 16710.2.1 Deliberative Architecture and Knowledge Model 16710.2.1.1 Natural Mind 16810.2.1.2 Prerequisites for Developing the Mind of the Social Robots 16910.2.1.3 Robot Control Paradigms 16910.3 Architecture Models for Robots 17010.4 Cognitive Architecture 17110.4.1 Taxonomy of Cognitive Architectures 17210.4.1.1 Symbolic Architectures 17210.4.1.2 The Emergent or the Connectionist Architecture 17310.4.1.3 The Hybrid Architecture 17310.4.2 Cognitive Skills 17310.4.2.1 Emotions 17310.4.2.2 Dialogue for Socially Interactive Communication 17510.4.2.3 Memory in Social Robots 17810.4.2.4 Learning 18010.4.2.5 Perception 18110.5 Challenges in the Existing Social Robots and the Future Scopes 18710.5.1 Sensors Technology 18710.5.2 Understanding and Learning from the Operator 18710.5.3 Architectural Design 18810.5.4 Testing Phase 18910.5.5 Credible, Legitimate, and Social Aspects 18910.5.6 Automation in Digital Forensics 19010.6 Conclusion 19010.7 Robots in Future Pandemics 194References 19411 VANET: An IoT Forensic-Based Model for Maintaining Chain of Custody 199Manoj Sindhwani, Charanjeet Singh and Rajeshwar Singh11.1 Introduction 20011.2 Cluster Performance Parameters 20111.3 Routing Protocols in VANET 20211.3.1 Performance Metrics 20211.3.2 Proposed Cluster Head Selection Algorithm 20311.4 Internet of Vehicles 20511.5 IoT Forensic in Vehicular Ad Hoc Networks 20611.6 Conclusion 207References 20712 Cognitive Radio Networks: A Merit for Teleforensics 211Yogita Thareja, Kamal Kumar Sharma and Parulpreet Singh12.1 Introduction 21212.1.1 Integration of WSN with Psychological Radio 21312.1.2 Characteristics of Cognitive Radio 21412.2 Contribution of Work 21612.2.1 Push-to-Talk 21812.2.2 Digital Forensic-Radio Communication Equipment 21912.2.3 Energy Harvesting Network 22012.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks 22012.3 Conclusion and Future Scope 221Acknowledgement 221References 22213 Fingerprint Image Identification System: An Asset for Security of Bank Lockers 227Mahendra, Apoorva, Shyam, Pavan and Harpreet Bedi13.1 Introduction 22713.1.1 Design Analysis 23013.2 Result and Discussion 23113.3 Conclusion 23213.4 Future Scope 234References 23514 IoT Forensics: Interconnection and Sensing Frameworks 237Nidhi Sagarwal14.1 Introduction 23714.2 The Need for IoT Forensics 24014.3 Various Types of Evidences Encountered 24214.4 Protocols and Frameworks in IoT Forensics 24214.5 IoT Forensics Process Model 24314.6 Suggestive Solutions 24814.7 Conclusion 249References 24915 IoT Forensics: A Pernicious Repercussions 255Gift Chimkonda Chichele15.1 Introduction: Challenges in IoT Forensics 25515.2 Scope of the Compromise and Crime Scene Reconstruction 25615.3 Device and Data Proliferation 25615.4 Multiple Data Location and Jurisdiction Challenges 25615.5 Device Type 25715.6 Lack of Training and Weak Knowledge Management 25715.7 Data Encryption 25815.8 Heterogeneous Software and/or Hardware Specifications 25815.9 Privacy and Ethical Considerations by Accessing Personal Data 25815.10 Lack of a Common Forensic Model in IoT Devices 25915.11 Securing the Chain of Custody 25915.12 Lifespan Limitation 25915.13 The Cloud Forensic Problem 25915.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud 26015.15 Evidence Analysis and Correlation 26015.16 Conclusion 260References 262About the Editors 263Index 265
Anita Gehlot, PhD is an associate professor at Lovely Professional University with more than 12 years of experience in academics. She has published more than 70 research papers in refereed journals/conferences and 28 books in the area of Embedded Systems and Internet of Things.Rajesh Singh, PhD is a professor at Lovely Professional University with more than 16 years of experience in academics. He has published more than 100 research papers in refereed journals/conferences.Jaskaran Singh, PhD in Forensic Sciences from Amity University Noida, serves as the Head of Department of Forensic Sciences at Lovely Professional University, Punjab, India. He has more than 14 research publications, 13 patents, 3 copyrights, and one edited book to his credit.Neeta Raj Sharma, PhD in Biochemistry from Jiwaji University, Gwalior. She is visiting professor at Birmingham City University, UK, and working in association with University of British Columbia, McGill University, Laval University, and University of Victoria in Canada. She has published more than 55 publications, 20 patents, 4 copyrights, and 2 edited books.
1997-2024 DolnySlask.com Agencja Internetowa