]>

Table of Contents

Contents

Preface

Acknowledgments

Editors

Contributors

Section I

1 Secure Fog-Cloud of Things: Architectures, Opportunities and Challenges

ADAM A. ALLI, KALINAKI KASSIM, HABIBA HAMID, NAMBOBI MUTWALIBI, AND LWEMBAWO IBRAHIM

2 Collaborative and Integrated Edge Security Architecture

ABEBE DIRO

3 A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing

NOUR MOUSTAFA

4 Security and Organizational Strategy: A Cloud and Edge Computing Perspective

MONJUR AHMED AND KRASSIE PETROVA

5 An Overview of Cognitive Internet of Things: Cloud and Fog Computing

FARIHA EUSUFZAI, TAHMIDUL HAQ, SUMIT CHOWDHURY, SHOHANI SAHREN, AND SAIFUR RAHMAN SABUJ

6 Privacy of Edge Computing and IoT

DAVID G. GLANCE AND RACHEL CARDELL-OLIVER

Section II

7 Reducing the Attack Surface of Edge Computing IoT Networks via Hybrid Routing Using Dedicated Nodes

JAMES JIN KANG, LESLIE F. SIKOS, AND WENCHENG YANG

8 Early Identification of Mental Health Disorder Employing Machine Learning-based Secure Edge Analytics: A Real-time Monitoring System

NAVEEN KUMAR OBURI, TAHRAT TAZRIN, AKSHAI RAMESH, PREM SAGAR, SADMAN SAKIB, MOSTAFA M. FOUDA, AND ZUBAIR MD FADLULLAH

9 Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification

SADMAN SAKIB, MOSTAFA M. FOUDA, AND ZUBAIR MD FADLULLAH

10 On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge

SARTHAK KOTHARI, TAHRAT TAZRIN, DHRUVI DESAI, ANAM PARVEEN, MOSTAFA M. FOUDA, AND ZUBAIR MD FADLULLAH

11 AI-Aided Secured ECG Live Edge Monitoring System with a Practical Use-Case

AMIT KUMAR, TAHRAT TAZRIN, ARTI SHARMA, SHIVANI CHASKAR, SADMAN SAKIB, MOSTAFA M. FOUDA, AND ZUBAIR MD FADLULLAH

Section III

12 Application of Unmanned Aerial Vehicles in Wireless Networks: Mobile Edge Computing and Caching

ANIQA TASNIM OISHI, LEEYANA FARHEEN RAHMAN, MOSARRAT JAHAN SIDDIKA, SHAHRIAR ARNAB, AND SAIFUR RAHMAN SABUJ

13 Vehicular Edge Computing Security

MEHMET ALI EKEN AND PELIN ANGIN

Section IV

14 On Exploiting Blockchain Technology to Approach toward Secured, Sliced, and Edge Deployed Virtual Network Functions for Improvised IoT Services

MAHZABEEN EMU AND SALIMUR CHOUDHURY

15 Usage of Blockchain for Edge Computing

A B M MEHEDI HASAN, SABBIR AHMED, MD SHAMSUR RAHIM, AND DR ANDREW LEVULA


Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.63.87