Index

Page numbers in Italics refer to figures.

A

  • anonymization, 93
  • anxiety, 118
  • Apple Homekit, 85
  • architecture, 8788, 89
  • arrhythmia, 137
  • artificial intelligence (AI), 139
  • authentication, 220, 227228

B

  • big data analytics, 43
  • bio-authentication, 178
  • biomedical signal analysis, 178
  • blockchain, 222
  • business continuity, 56
  • BYOD, 58

C

  • caching, 72
  • car insurance monitoring, 191
  • challenges, 101
  • cloud, 102
    • computing, 121
    • infrastructure, 247
    • service, 249
  • cloud service provider (CSP), 266
  • cognitive IoT, 66
  • cognitive radio, 66
  • compliance, 161
  • computing, 163
  • contact tracking mobile applications, 95
  • copyright, 5758
  • cyber-attacks, 56
  • cybercrimes, 10
  • cyber security, 48

D

  • data accessibility, 157
  • data rate, 202
  • decentralized edge computing, 157
  • depression, 118
  • Dew, 3
  • differential privacy, 24
  • digital assets, 52
  • disaster recovery, 54

E

  • edge, ix
    • computing, ix
    • computing security, x
    • device, 4
    • infrastructure, 42
  • electrocardiogram (ECG), 137
  • Electronic Health Records (EHR), 156
  • encryption, 158
  • energy consumption, 202

F

  • facial expression detection, 125
  • federated learning, 129
  • firewalls, 9
  • fog, 9
  • fog computing, 13
  • future networks, 245

G

  • Google Home, 263

H

  • healthcare, 264
  • heartbeat classification, 137
  • human factors, xxi
  • hybrid routing, 101
  • hyperledger fabric, 155

I

  • identity and access management, 60
  • information security, 60
  • Internet of Everything (IOE), ix
  • Internet of Things (IoT), ix
    • ecosystem, 248
    • security, 6
  • intrusion detection, 203

K

  • k-anonymization, 9394

L

  • latency, 103
  • local computing, 212
  • low-power WAN (LPWAN), 102

M

  • machine learning, 28
  • man-in-the-middle (MITM) attacks, 30
  • mental health, 117
  • mobile application, 118
  • mobile computing, 206
  • mobile edge computing, 43
  • multi-access edge computing (MEC), 245

N

  • network function virtualization (NFV), 245
  • network slicing, 250
  • non-orthogonal multiple access, 207

O

  • off-chain storage, 158

P

  • policy, 167
  • privacy, 118
    • preservation, 124
    • preserving techniques, 92
    • spaces, 92
  • processing delay, 213
  • pulse heart rate sensor, 188

Q

  • questionnaire, 119

R

  • random forest, 139
  • Raspberry Pi, 139
  • Reconfigurable Intelligent Surface, 67
  • remote monitoring, 91
  • risk management, 54

S

  • SDN, 42
  • security, 4
  • security breach, 58
  • Service Level Agreement (SLA), 58
  • smart contracts, 156
  • smart health, 121
  • smart vehicles, 178
  • Software Defined Networking (SDN), 68
  • solutions, 45
  • strategic planning, 52
  • strategy, 18

T

  • technological factors, 52
  • transmission delay, 202
  • trust, 165
  • trusted time server (TTS), 103

U

  • unicity, 94
  • Unmanned Aerial Vehicles, 201

V

  • vehicular edge computing, 219
  • Virtual Network Function (VNF), 245

W

  • Wide Area Network (WAN), 69
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.121.131