296
Index
Computational power, 238, 243, 244, 246,
247, 249, 251, 253, 254, 260, 261,
263
Conclusion, 167
Confidentiality, 143, 146, 166
Confusion matrix, 175
Connected banking, 181, 184, 185
Consensus, 2, 4, 11, 16, 153, 158, 212, 213,
227, 239, 241, 244, 247, 251, 252,
254
Consortium Blockchain, 32
Constrain Applications Protocol (CoAP),
101
Control framework, 99
Convergence, 239, 243
Cyber-Physical System (CPS), 82
Credentials, 127, 212
Credit reporting, 197
Cross-border transfers
opportunities, 34
Crypto agility, 243, 244
Cryptocurrency, 27, 270
Cryptographic, 24, 209, 210, 213, 219, 220,
222–225, 230
Cryptographic hash, 242, 243, 262
Cryptography, 151, 154, 166, 210, 212,
213, 224, 240, 242, 254, 274
Customer credit offering, 182
Cyber-Physical System (CPS), 82
D
Data
blockchain, 25
DATA-COIN, 63
Data layer, 11
Data protection, 268
Data security, 149, 155, 166
Data violations, 146, 150
DDoS attacks, 104
Decentralization, 28, 52
challenges, 39
Decentralized, 2, 4, 15, 142, 152, 167, 210,
214, 218, 219, 221, 224, 225, 228,
230, 231
ledger, 27
Decentralized Finance, 210
Decentralized Identifiers (DIDs), 119, 218,
220, 221, 222, 232, 233
Decentralized Identities, 218
Decentralized Public Key Infrastructure
(DPKI), 210, 225, 230–232
Decryption, 151, 158, 161
Detection rate, 175
Device management, 270
Dew, 1, 8, 10, 13, 14
DIAM-IoT, 223, 233
Digital ecosystem, 182, 185
Digitized banking, 184, 186
Disadvantages of Private Blockchain, 32
Disadvantages of Public Blockchain, 31
Distributed, 152, 166, 239–241, 263
Distributed Control System (DCS), 96
Distributed directory, 272
Distributed ledgers, 3, 188, 267
Distributed Ledger Technologies, 212, 222,
223
Distributed time-based consensus, 241
Drones, 128
Dynamic framework, 83
Dynamic physical processes, 83
E
Ecosystem, 43
Edge, 7, 8, 10
Efficiency, 2, 8
Electronic Medical Record (EMR), 94
Electronic Welfare Records (EHRs), 94
Elliptic Curve Cryptography (ECC), 151,
162, 166
Embedded sensors, 273
Emercoin, 231
Emerging trends in IoT, 271
Encryption, 2, 151, 157
Energy efficiency of STS, 284
Energy Consumption
challenges, 39
Environment component, 84
Ethereum, 58, 227, 229, 231, 232
Ethereum and Bitcoin, 132
Execution time, 161
F
False negative, 176
False positive, 176
False Positive Rate, 176
Federated Identity (FId), 217
Fiber, 73
51% attack, 16
Financial Services, 34
Fine-grained access control, 117
Firmware, 270
Fog, 8, 9, 13
Fog computing, 102
Frameworks of Frameworks (CPSoS), 86