\r\n\tb) how a concentrated attention focus on screens (i.e., tablets and smartphones) could result in a total activity absorption and a flow experience;
\r\n\tc) teens' preference for media social interaction appears to be closely associated with impaired modes of mood regulation;
\r\n\td) the web activities as factors of externalized and/or internalized risks;
\r\n\te) the implementation of health promotion interventions by Internet Apps; finally,
\r\n\tf) the cross-cultural differences and similarities about teen approaches to the web around the world.
\r\n\tThis book intends to provide the reader with an overview of studies with a research topic that is crucial today: the need to integrate teens' use of the web into the processes contributing to determine adolescents' developmental trajectories and Quality of Life.
",isbn:"978-1-83969-594-0",printIsbn:"978-1-83969-593-3",pdfIsbn:"978-1-83969-595-7",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!0,hash:"f005179bb7f6cd7c531a00cd8da18eaa",bookSignature:"Prof. Massimo Ingrassia and Prof. Loredana Benedetto",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/10671.jpg",keywords:"Media Multitasking, Brain Development, Optimal-Experience Conditions, Digital Media Use, Mood Self-Regulation, Social Networking, Health Risk Behaviors, Internalizing/Externalizing Risk, Health Behaviors, Prevention, Cross-Cultural Research, Teen",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"February 25th 2021",dateEndSecondStepPublish:"March 24th 2021",dateEndThirdStepPublish:"May 23rd 2021",dateEndFourthStepPublish:"August 11th 2021",dateEndFifthStepPublish:"October 10th 2021",remainingDaysToSecondStep:"a month",secondStepPassed:!0,currentStepOfPublishingProcess:3,editedByType:null,kuFlag:!1,biosketch:"Massimo Ingrassia is Director of the Post-graduate Advanced Studies in Palliative care and pain management for psychologists and a scientific advisor in research projects assessing psychological adjustment and therapeutic adherence in chronic illness. He was the author or co-author of several articles, and editor of the books on Parenting.",coeditorOneBiosketch:"Loredana Benedetto, Ph.D., is a psychologist and professor of Developmental and Educational Psychology at the Department of Clinical and Experimental Medicine, University of Messina. She was a scientific consultant for projects supporting families of the disabled and interventions in pediatric palliative care.",coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"193901",title:"Prof.",name:"Massimo",middleName:null,surname:"Ingrassia",slug:"massimo-ingrassia",fullName:"Massimo Ingrassia",profilePictureURL:"https://mts.intechopen.com/storage/users/193901/images/system/193901.png",biography:"Massimo Ingrassia, PsyD, is an Associate Professor of Developmental and Educational Psychology at Messina University, Italy, where he teaches graduate and postgraduate courses in Health Psychology. He is the Director of the postgraduate advanced studies in Palliative Care and Pain Management for Psychologists. His research interests include risk behaviors in adolescence and emerging adulthood, childhood development and digital technologies, pediatric palliative care and family resilience, and quality of life and chronic diseases. Dr. Ingrassia is also a scientific advisor for research projects assessing psychological adjustment and therapeutic adherence in chronic illness. He is the author or coauthor of several articles and books, including Growing Connected: Web’s Resources and Pitfalls",institutionString:"University of Messina",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"University of Messina",institutionURL:null,country:{name:"Italy"}}}],coeditorOne:{id:"193200",title:"Prof.",name:"Loredana",middleName:null,surname:"Benedetto",slug:"loredana-benedetto",fullName:"Loredana Benedetto",profilePictureURL:"https://mts.intechopen.com/storage/users/193200/images/system/193200.png",biography:"Loredana Benedetto, Ph.D., is a psychologist and Professor of Developmental and Educational Psychology at the Department of Clinical and Experimental Medicine, University of Messina, Italy. She teaches undergraduate and graduate courses in the areas of typical and atypical development, parent-child relationships, educational psychology, and family-based interventions. She has been a scientific consultant for projects supporting families of disabled children and interventions in pediatric palliative care. Her research interests focus on parenting assessment, self-efficacy and parental cognition, digital parenting and problematic use of the Internet in children, metacognition and childhood disorders, early intervention in autism and developmental disabilities, and behavioral parent training. She is the author or editor of several books, including Parenting: Empirical Advances and Intervention Resources (coedited with Massimo Ingrassia).",institutionString:"University of Messina",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"University of Messina",institutionURL:null,country:{name:"Italy"}}},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"21",title:"Psychology",slug:"psychology"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"205697",firstName:"Kristina",lastName:"Kardum Cvitan",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/205697/images/5186_n.jpg",email:"kristina.k@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"6494",title:"Behavior Analysis",subtitle:null,isOpenForSubmission:!1,hash:"72a81a7163705b2765f9eb0b21dec70e",slug:"behavior-analysis",bookSignature:"Huei-Tse Hou and Carolyn S. Ryan",coverURL:"https://cdn.intechopen.com/books/images_new/6494.jpg",editedByType:"Edited by",editors:[{id:"96493",title:"Prof.",name:"Huei Tse",surname:"Hou",slug:"huei-tse-hou",fullName:"Huei Tse Hou"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2270",title:"Fourier Transform",subtitle:"Materials Analysis",isOpenForSubmission:!1,hash:"5e094b066da527193e878e160b4772af",slug:"fourier-transform-materials-analysis",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/2270.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"54023",title:"Raman Microscopy: A Suitable Tool for Characterizing Surfaces in Interaction with Plasmas in the Field of Nuclear Fusion",doi:"10.5772/65649",slug:"raman-microscopy-a-suitable-tool-for-characterizing-surfaces-in-interaction-with-plasmas-in-the-fiel",body:'\nRaman microscopy, which is sensitive to chemical bonds, defects, and structure, is a suitable tool that can give information on how a material can be modified by interacting with ions. We first gave concrete examples on how it can be used to characterize with a micrometric resolution samples extracted from tokamaks. We then gave concrete examples on what information can be obtained by doing a study on laboratory‐synthesized materials, comparing Raman microscopy with quantitative techniques. The first part of the chapter is focused on carbon‐based material analysis. We showed how Raman spectra are sensitive to the presence of hydrogen, a major safety issue in the field. The second part of the chapter is focused on beryllium‐ and tungsten‐based material analysis. We showed that hydrogen can be stored as a hydride after ion implantation and that it can be released easily in tungsten oxide.
\nTokamaks are machines made to study the possibility to make energy from nuclear fusion reactions by confining hot plasma (1–100 keV ions) magnetically. The future international reactor
Then, in tokamaks, understanding and being able to predict the evolution of the plasma‐facing components (PFCs) that interact with both heat loads and the cold edge plasma is one of the keystones to make nuclear fusion a way of producing energy in the future [2]. The material chosen for the
In this field of research, due to their isotope selectivity, ion beam analyses (IBA) play a prominent role in this characterization, as discussed in Refs. [15, 16]. Thermal desorption spectroscopy (TDS) also plays a key role as it can give access to the characterization of D or T trap energies in metals such as Be [17–19] or W [20]. However, even if TDS and IBA techniques give quantitative information about hydrogen isotope concentration, they only give indirect information about chemical bonding. A direct way to probe that chemical bondings is to probe them spectroscopically by means of their vibrational spectrum using Raman microscopy.
\nMoreover, the in‐depth resolution reached by IBA is not enough to describe properly the top layer of deposits called the
Transmittance in function of the depth for Be, W, C.
The aim of this chapter is to give concrete examples on how Raman microscopy can be used to characterize samples extracted from tokamaks, from the micrometric to the macroscopic scale of the machine. We then gave concrete examples on what information can be obtained by doing a study on laboratory‐synthesized materials, benchmarking Raman microscopy with quantitative techniques such as TDS or IBA. The first part of the chapter is focused on carbon‐based material analysis as all the previous tokamaks were using this element in the past. We showed how Raman spectra are sensitive to the presence of hydrogen, a major safety issue in the field. The second part of the chapter is focused on beryllium and tungsten based material analysis. We showed that hydrogen can be stored as a hydride after ion implantation, and that it can be released easily in tungsten oxide.
The Tore Supra tokamak had the ability to perform long plasma discharges with actively cooled PFC, which was a good opportunity to study fuel retention, a major concern in the plasma‐wall interaction community. The study devoted to that was the Deuterium Inventory in Tore Supra (DITS) campaign. It was aimed at studying and linking the erosion of carbon PFCs and the fuel retention. The in‐vessel D inventory was followed after the D loading campaign through particle balance [24], a part of the toroidal pump limiter (TPL), which was actively cooled during discharges, was dismantled for an extensive postmortem analysis of a few tens of carbon fiber composite tiles (CFC). The TPL was situated on top of a part of the machine called the neutralizer (NTR), which was also composed of CFC, but which was not actively cooled during discharges.
\nThe
Temperatures of the TPL were determined (with the help of thermographic measurements [24]) to be 500°C for gap surfaces of both thick deposit tiles and eroded tiles, 200°C for top surfaces of eroded tiles and 120°C for both gap and top surfaces of CFC tiles situated in the so‐called thin deposit region. Temperature was estimated to vary in the range 500–900°C for the top surface of thick deposit tiles.
\nIn Figure 6, we display Raman spectroscopic parameters of several samples, but before detailing the figure, we need to remember some well‐known facts about the Raman spectroscopy of disordered and amorphous carbons. They are briefly given below but are not detailed.
\nRaman microscopy is routinely used to characterize rapidly C‐based materials, from nanocrystalline graphite (nc‐G) to amorphous carbons, hydrogenated or not (a‐C:H or a‐C). It probes the structure [32] and is highly sensitive to bonding properties by interpreting the 1000–1800 cm−1 region, dominated by the G and D bands due to C(sp2) hybridization of carbon atoms [33]. The G band, close to
Spectra of a‐C and nc‐G are clearly distinct [37] (spectrum 1 from Figure 8(a) belongs to a‐C, whereas spectrum 3 belongs to nc‐G, whereas spectrum 2 is in between): for example, G and D bands are much broader for a‐C (width
The Raman parameters generally used to probe the structure are the peak wavenumber and the width of the G and D bands, respectively, and the peak height ratio of these two bands, HD/HG [48]. An additional spectral feature has to be taken into account: a photoluminescence background which is superimposed to the Raman spectrum and is correlated to the H content [46]. The slope of this background, m, is calculated between 800 and 2000 cm−1. The higher m, the higher is the photoluminescence intensity. Figure 2 displays ultra‐high vacuum heating effect on a 220‐nm thick hard amorphous, hydrogenated carbon thin films (a‐C:H) that were deposited on a Si [49]. The mass density of such typical hard a‐C:H layers, with H/H+C ∼ 30 at.% is ∼1.9 g cm−3 are formed [50].
\n\nTDS, IBA and Raman microscopy measurements of a heated a‐C:H sample.
Figure 2 displays the thermal evolution of m/HG and HD/HG compared to the H content determined by IBA and the H2 release determined by TPD.
We see that m/HG increases by ∼40% between room temperature and 300°C, decreasing between 300 and 600°C (at that point, m/HG ∼0.05). For
The bottom part of Figure 2 shows that HD/HG and H/H+C evolve in a remarkably symmetrical way. This suggests that the two parameters are correlated and that HD/HG could be used to probe the hydrogen content. The relation obtained that works with a 514 nm laser is (H/H+C = 0.54−0.53 HD/HG) in the range H/H+C = 2–30 at .%. Such a linear law, with the same slope, can be obtained for other wavelengths (407–633 nm has been tested), but with a different value at the origin.
The thermal stability of six 200‐nm‐thick plasma enhanced chemical vapor deposited a‐C, a‐C:H and a‐C:D layers ranging from soft to hard layers has been studied. The imaginary part of the refractive index at 633 nm and the corresponding H or D contents have been displayed together and compared to results from the literature [50], showing a good agreement with what is known: when the H content increases, the sample becomes more transparent, because of the diminution of aromatic C(sp2) bonds. Figure 3(b) displays the thermal evolution of HD/HG for these six samples heated with a linear ramp (3°C min−1) under a 1‐bar argon atmosphere from room temperature to 600°C.Without entering into details, that can be found in [23], let us only focus on H data. One can see that the more hydrogen there is on the as deposited sample, at a lower temperature, the HD/HG ratio starts to increase. Because the evolution of HD/HG for a H‐free amorphous carbon is small and because of what was shown in the previous part, most of the evolution in that thermal range is due to hydrogen release from C(sp3). This is consistent with what is known in the literature about the bad thermal stability of hydrogen‐rich a‐C [51–55].
\n\nThermal evolution of HD/HG for six a‐C samples. (a) Optical constant in function of H content. (b) Comparative linear ramp study. Green stars in the top figure are from Ref. [
Figure 4 displays an example of isothermal evolution in function of time. This evolution cannot be due to the effect of the laser on the sample, accumulating heat with long times, as we compared two sets of data: one by switching off the laser between acquisitions and one with a continuous flux of heat. The position of the G band (not shown) no more evolves after 50 min, meaning there is no order increase due to an overestimated heat load by the probe laser. In Ref. [56], we studied that we had no power dependence in the range 0.01–1 mW/μm2. Then, this technique allows to probe long‐term hydrogen release. We will use it on tokamak samples in Section 2.3.
\nExample of in situ measurement isothermal annealing.
Then, to resume, we have shown that\n
The m/HG parameter, often used to estimate the H content in the literature, should be used with care, first because it is sensitive to various photoluminescence‐quenching processes and second because it is not sensitive to H bonded to C(sp2).
The HD/HG parameter is quasi‐linear in the full range of H content and can thus be used to estimate the H content.
HD/HG can be used in situ to retrieve the H content evolution under heating.
The modification by ion impact of graphite has been studied both theoretically and experimentally ([57–67] and references therein). Inside the sample, collision cascades are created by ions that knock on the surface and penetrate. It creates defects and vacancies, ions being implanted after they slow down [68]. Protusions (height lower than 1 nm), called hillocks, are observed for low fluencies (<1014 ions cm−2) [57, 58]. They are due to stress created by the first collision under the near surface region. More precisely, interstitial carbon clusters or coalescence of interstitials and vacancies are at the origin of these hillocks. At fluencies >1015 ions cm−2 [61, 62] and in the 400–800 K range, domes with a height one order of magnitude higher were observed.
\nWe have exposed graphite to hydrogen deuterium and helium plasma (from 1016 to 1018 cm−2) [43]. The energies were tuned from 40 to 800 eV. The ion incidence was parallel to the basal plane for CFC (carbon/carbon composite) and perpendicular for HOPG (highly oriented pyrolitic graphite). The changes of the material were studied by means of both Raman and atomic force microscopies.
\nWe display the 400 eV/D implantation Raman spectra in Figure 5 as an illustration. The main differences or common points between HOPG and CFC are\n
Pristine HOPG contains less defects than CFC (D band at 1350 cm−1 is close to zero for HOPG, whereas HD/HG is close to 2 for CFC, indicating nanometric crystal size domains)
Implantation produces an amorphization for both materials (broad bands at 1500–1300 cm−1 appearing in the spectra, looking like the spectrum 1 in Figure 8(a))
The underlying pristine sample is visible can be seen in both cases. This is because the ions penetrate only 15–20 nm and the penetration depth of light is few tens of nanometer (see Figure 1).
Both bombarded Raman spectra display two kind of environment: in‐plane defects and out of plane defects (see Ref. [43] for details).
No laser probe polarization effect of IPD and OPD on the HOPG sample, whereas there is one for IPD of the CFC.
Raman spectra of bombarded HOPG and CFC.
When increasing the impinging ion energy, the growth of nanometric domes at the surface has been observed by atomic force microscopy (AFM) and the incident kinetic energy has been found as the parameter determining their height. The Raman study has also revealed that both the defect‐defect distance in the IPD and OPD are typically 1 nm. When the number of vacancies created in the material increases, the number of in‐plane defects decreases to the benefit of the out‐of‐plane defects.
Figure 6 displays the G band position,
Carbon deposits spectroscopic parameters: G band position in function of its full width at half maximum.
In Ref. [23], we compared with Raman microscopy the thermal evolution of reference samples to samples extracted from the Tore Supra tokamak, as it was shown that a long‐term mechanism [71] occurred even at low temperature (low means here 120°C, which correspond to the thermostat temperature of the PFC cooling loop, staying at this values for days and weeks even when the plasma is off) and as we wanted to distinguish the Raman signature of this heating. Figure 7 displays the Raman data of the Tore Supra samples. Figure 7(a) and (b) is mappings of m/HG and sG, respectively, for an as received sample. One can see that the deposit is inhomogeneous, the sample being more organized in the upper right part. The high value of m/HG does not mean here that there is more hydrogen there, as mentioned by discussing Figure 2. In fact, this is the opposite. The value of HD/HG in the blue and red regions (not shown here) give typically values of 28 down to 17%, using the linear relation mentioned in Sect. 2.1. The zone where hydrogen has been outgassed displays a higher value of
Raman spectroscopy imaging of a unheated Tore Supra (TS) deposit. (a) m/HG mapping of this TS sample. (b)
In Ref. [72], lock‐in thermography, scanning electron microscopy and confocal microscopy were used to study the erosion and depositions on the TPL of the Tore Supra tokamak. Taking into account, all the methods allowed the authors to perform a complete mapping of the mass of carbon that has been eroded and deposited. The foundings were 520 g of deposits and 920 g of eroded carbon. It shows that more than a half of the carbon that is eroded is redeposited on the TPL. It was also found that the zones containing the highest deposits were found close to erosion zones.
\nSuch things were simulated recently [31]. The gap deposition contribution is estimated at 23%, mostly from the erosion zones and with a main contribution from the low field side of the tile toroidal gap surfaces. This deuterium impoverishment in the deep layer has also been investigated more systematically in Ref. [73] where IBA and cross‐section electron microscopy where done on 15 samples. The mean in‐depth hydrogen isotope content is plotted in Figure 8(b) and scaled to the 120 µm of the deposit shown. The surface content has been divided by 2 in less than 20 µm. In parallel,
H‐content impoverishment in deep deposits compared to ordering of the carbon. H content is extracted from Ref. [
Tritium retention, occurring in a magnetically confined deuterium plus tritium plasma, can be obtained by erosion, retention, material modification, dust formation (and more generally plasma wall interactions). This is a big safety issue because of tritium radioactivity [7, 74]. Hydrogen isotope retention in beryllium can also play a role in the lifetime estimation of the ≈700 m2 ITER\'s beryllium inner walls because of erosion [75]. This explains why several studies based on ion irradiation of Be samples have been devoted to D behavior to ensure that tritium retention will not be a limiting issue in ITER operations. Previous studies found D/Be ratio in the range 0.1–0.7 using energies in the range 0.6–20 keV/D and fluency in the range 1016–1019 cm−2 [76–82].
\nAt fluencies close to 2 × 1017 cm−2 (in the range 0.6-1 keV/D), the existence of the D-content saturation (D/Be close to 0.25) has been shown [13, 83–84]. For fluencies lower than 0.7 × 1017 cm−2 TDS display only one peak at 900 K, whereas for fluencies between 0.7 and 1 × 1017 cm−2, a second peak lies at 750 K. For fluencies higher than 1.2 × 1017 cm−2, two extra peak rise close to 500 K. These last peaks were explained by structural modification of the sample. Moreover, the role of crystal orientation and D diffusion along grain boundaries was investigated in [85]. The existence of BeH2 was suggested in [17] but never observed before.
\nRaman microscopy is a nondestructive, noncontact and local (≈1 μm2 lateral resolution [86]) technique that has been proved to be sensitive to Be stretching modes [87], beryllium oxide modes [88], bending and stretching tungsten oxide modes [89], BexWy‐mixed samples density of states [90], BeCW‐irradiated samples [91] and give information when a pristine material is implanted by hydrogen ions [90, 92, 93]. First Raman analyses in ILW‐tokamaks were performed on some molybdenum JET mirrors [90], showing that the technique is sensitive to thin ≈10 nm deposited layer composed of ≈33% Be, ≈33% C and ≈33% O and the underlying molybdenum oxidized mirror. C‐O and C=O modes have been detected in that layer and defective or beryllium mixed with O and/or C have been found without possibility to identify the phases rigorously up to now, because of a poor benchmarking of the technique for these materials. Raman microscopy can also be able to give information about the hydrogen isotope behavior by combining IBA, Raman microscopy, atomic force microscopy (AFM) and with the help of DFT modeling. As an illustration of this complementarity, in Ref. [94], we identified on laboratory experiments the growth of BeD2 with dendritic forms appearing subsequently to 2 keV ion implantation when the Be layer is saturated by implanted D ions. The width of the bands recorded by Raman microscopy suggested that this hydride has grown in a crystalline form which seems to be close to a body‐centered orthorhombic structure with Ibam symmetry as the spectra look like to the ones reported in [95], who determined recently the structure by using additionally synchrotron X‐ray diffraction. In [94], we showed that these dendrites appear when the amount of deuterium in the material is higher than ≈2 × 1017 D.cm−2, when the ≈40 nm under surface layer is saturated by D.
Below, we compare defective Be samples that have been produced by Be deposits in an impurity atmosphere or by D implantation. In more details, the defective deposit sample has been produced by the thermionic vacuum (TVA) method (more details can be found in Ref. [96] and references therein). To introduce disorder, a partial pressure of N2 (in the range from 10−2 to 10−3 Pa partial pressure) has been used during the deposit. The amount of N being ≈5 atomic %. The D‐implanted Be sample have been prepared with two impinging ion geometries, with 2 keV/D: normal incidence (90°) and 45° incidence. More details about the implantation of the 90° geometry can be found in [94].
\nFigure 9 displays Raman spectra of a deposited Be sample with a high content of defects for four laser wavelengths. Data were acquired with 633, 514, 488 and 325 nm lasers. The band associated to the E2G Raman active mode is downshifted for the defective sample, but the shift depends on the wavelength.
Normalized Raman spectra of a pristine (a) and defective (b) Be deposited sample, using four laser wavelength. (c) The 633 nm spectrum of the defective sample is displayed after removing the E2G Raman active mode and is compared to the PDOS measured by INS and by PCEPI [
Changing the wavelength does not change the qualitative trends: the band related to the E2G mode is more downshifted to low frequencies and broader. However, quantitative differences can also be seen, with some information. For example, the height of the PDOS diminishes monotonically with the decrease of the laser wavelength (from 23% with 633 nm down to 4% with 325 nm for the defective sample).
In Figure 10, we compare 514 nm spectra of a pristine Be, a Be sample containing 2 × 1017 D cm−2 in the 90° geometry and 514 nm spectrum of Be sample in the 45° geometry. D implantation (Figure 10(b)) and vacancy creation profiles were evaluated for the 90° and 45° geometries using the stopping and range of ions in matter (SRIM) code2 [68]. If we believe in SRIM calculations (which gives trends as many mechanisms and effects are not included), we can then estimate that 16% of the implanted deuterium atoms are implanted in the range 0–19 nm, 31% in the range 0–28 nm and 37% in the range 0–31 nm. For the corresponding ranges, the total amount of vacancies created are, respectively, 37, 59 and 65% of the total vacancies created. The lineal density of vacancies is the higher in the range 0–28 nm, being lower by 7.6% in the 0–19 nm range and by 0.4% in the 0–31 nm range.
\nVarying the in‐depth defects. (a) Normalized Raman spectra of D implanted Be samples. Geometry implantation (90° and 45°) are compared with the 514 nm laser wavelength.
We see that the Be implanted by D in the 90° geometry displays a Raman spectrum with a E2G mode downshifted by 5 cm−1 and with an additional broadening of 6.5 cm−1 compared to the pristine sample. The PDOS is present, with a relative height ratio of HPDOS/HBe=3%. If we compare with the Be implanted by D in the 45° geometry, we see that the band corresponding to the E2G mode is downshifted by 5 cm−1, with an additional broadening of 30 cm−1 compared to the pristine sample. The PDOS is rising, with a relative height ratio HPDOS/HBe of 24%. The band position is the same in the two implantation geometries. However, the bandwidth
By using energetic ions, and with the help of nuclear reaction analysis (NRA), AFM, optical microscopy and quantum calculations compared to Raman spectroscopy, we were able to evidence the formation of crystalline BeD2 [94]. The spectra are typically close to the one found for BeH2 in Ref. [95] using high pressure to form them. It was shown previously that this latter technique is sensitive to the way hydrogen isotopes are bonded and organized in materials and thus that it can be relevant for fusion [92] and might be of interest for hydrogen storage by forming hydrides [98].
\nFigure 11 shows Raman imaging in the vicinity of a dendrite. In Figure 11(c), the intensities of the band at 1397 cm−1 due to a Be‐D mode are displayed. It is more intense on the dendrite and less intense off the dendrite. The corresponding spectra are displayed in Figure 11(d). Details on how were obtained the spectra can be obtained in [94]. The bands marked by stars are due to Be‐D bonds in BeD2. The fact that their corresponding intensity are higher are more intense on dendrite allows to conclude that the dendrites are made of BeD2. If the formation of such dendrites occurs in tokamaks, it could become a high fuel reservoir.
\n\nBeryllium hydride formation under ion implantation. (a) and (b) Optical microscopy. (c) Be‐D bond intensity mapping. (d) Position of carbon impurities. (d) Comparison off/on dendrites. (e) Raman spectrum of carbon impurities.
Figure 11(d) display the intensity of a mode found close to 1580 cm−1 and due to carbon contamination of the sample before it was bombarded (D and G bands in Figure 11(e)), and that has nothing to do with the experimental conditions.
Tungsten alone cannot be seen using standard Raman microscopy because there are no optical phonons that can be probed close to the center of the Brillouin zone. However, as oxygen is one of the impurities that can be found in tokamaks, and as the inner walls will be at temperatures ranging from few hundreds to 1000°C because of heat loads, it could be possible that some oxide will be formed [99]. Then it would be of interest for the plasma‐wall interaction community to take care of D and T behavior in tungsten oxides. Without entering into details, tungsten oxides can exist in various forms (dioxide, trioxide, in between stoichiometry), with many phase transitions that can be affected by nanosize effects [100] so that a systematic D implantation study could be helpful for the future. Today, only a few studies exist on the subject. In [93], we report on the formation of thin tungsten oxide layers that have been grown on W surfaces by thermal oxidation (thicknesses up to ∼250 nm) and that have been exposed to low energy deuterium plasma (11 eV/D+). Raman microscopy and X‐ray diffraction show a nanocrystalline WO3 monoclinic structure. We observed that the low‐energy deuterium plasma exposure has induced a phase transition, a change in the sample color and the formation of tungsten bronze (DxWO3). After exposure under ambient conditions, a reversible deuterium retention, due to oxidation of the DxWO3 layer, has been observed. Figure 12 displays the effect of D implantation. The spectral range of tungsten trioxides can be roughly distributed in two kind of spectral regions: the bending modes region, lower than 500 cm−1 and the stretching modes region at higher wavenumbers. Before exposure, we can see the characteristic peaks of the monoclinic structure at 703 and 805 cm−1 which are attributed to symmetric and antisymmetric (O‐W‐O) stretching modes, respectively (see references in Ref. [93]). The wing in the range 920–970 cm−1 is attributed to terminal oxygen bonding in case of nanocrystalline structures, but other interpretations can be found in the literature that we do not review here. Due to implantation, all the peaks are broadened, the bending modes display bands that are more intense than stretching modes, which can be the sign of some disorder, and two new bands appeared: one at 950 and the other at 388 cm−1. These bands disappeared with time once put in air due to reoxydation.
\nRaman spectra of bombarded WO3.
Because of safety issue, it is important to understand how and where tritium will be stored in tokamaks due to plasma‐wall interaction. In this chapter, we have demonstrated the ability of Rama microscopy to detect and characterize material changes subsequently to interaction with hydrogen, for both carbon‐based tokamaks and for ITER‐like wall materials (tungsten that is oxidized and beryllium). The comparison between well‐controlled samples and sample extracted from tokamak has been used to better characterize some of the tokamaks’ properties.
\nAmong other findings, we report that by changing temperature on various carbon samples, extracted from tokamak (Tore Supra) or comparative reference laboratory samples (a‐C:H) synthesized in controlled conditions, we have shown how Raman spectroscopic parameters can be used to characterize structural and H‐content evolution/changes.
\nWe also report that beryllium hydrides that can form high tritium reservoir in tokamaks can be formed and detected under ion implantation.
\nTo conclude, next studies will have to use different laser wavelengths as they can be used to probe gradients of properties in the beryllium’s depth due to the fact the depth probed is in the range of few tens of nanometer. This is the typical depth at which a high content of hydrogen isotope is found in modern tokamak samples like JET. Future studies have to be driven with this technique to better characterize the so‐called supersaturated layer.
WSN is an emerging research area that promotes wireless communication across the nodes in a network in a random fashion. A huge set of parameters relevant to natural weather conditions pertaining to spatial and temporal domains is prominent to assess the performance of WSNs. Hence, in comparison with the normal ad-hoc networks, WSN exhibits more restricted constraints and critical conditions. WSNs are designed with a wide variety of sensors designed to tune in consistent with the particular application based domain. In WSNs, each node is mostly equipped with a restricted battery, a rather tiny memory unit, a simple processing unit, and a radio transceiver. Communication through these devices leads to the actual fact that a sensor network is a wireless ad-hoc network. Each sensor node generally supports multi-hop routing where nodes act as forwarders, relaying data packets to sink or a base station. Apart from monitoring the environment, the biggest challenge posed in WSN is the computation capability. Some of the algorithmic issues that need to be tackled in a sensor network are routing, object tracking, data gathering, power saving, base station initiated querying, etc. Solutions to the aforementioned problems hence demand an innovative computing paradigm [1].
One of the main challenges in WSNs is the large scale networking that is the sheer size exhibited by the wireless sensor networks. WSNs have an extensive collection of present and future applications ranging from a few hundred to several hundred thousand, comprising of low-end sensor nodes. The first direct consequence of such a large scale is the huge amount of traffic load incurred across the network. This could easily exceed the network capacity, and hence, hamper the communication reliability due to packets loss by collisions and congestion along the chosen path to the destination from the event field [2]. The other major aspect to deal with WSNs is the growth of the network, which impacts the overall performance and functionality. In such a scenario, it becomes essential to find the optimal routes and to maintain the communication overhead at tolerable levels when data broadcasting over a large network. This plays a prominent role to assess the scalability aspect of WSN in terms of time and space complexity. As the network scales up, the routing tables and traffic to maintain these tables also increase. For this reason, networking systems must be adaptive and scalable to variation in the size of the network. Bio-inspired mechanisms such as Ant Colony Optimization (ACO) techniques provide efficient routing mechanisms for large-scale mobile ad-hoc networks. Another major challenge to be considered is the dynamic nature of WSNs. Early communication systems comprising of transmitter/receiver pairs and communication channel are all static, whereas current networking systems are dynamic due to their node behavior, mobility, bandwidth channels, demand patterns, traffic and networking conditions. It is essential to take into account the communication mode adopted across the nodes within a particular range to estimate the overall network quality. In a target tracking application, the amount of traffic generated may increase or decrease with the time which depends upon the target behavior and monitored area. This imposes a varying load on the network resulting in inefficient capacity utilization if static approaches are used. To solve this problem, the bio-inspired solutions are known to be proficient in adapting themselves to changing circumstances towards survival.
The ability to deal with resource constraints also adds up to a major challenge in WSNs. As the number of resources acquired by the nodes increases, the overall cost in terms of bandwidth utilization also increases. More specifically, for the WSNs composed of nodes that are inherently constrained in terms of energy and communication resources, these limitations directly bound their performance and mandate for intelligent resource allocation mechanisms. The biological systems help researchers by providing solution approaches to deal with the trade-off between high demand and a limited supply of resources. For example, in the foraging process [3], ants use their individual limited resources towards optimizing the global behavior of colonies in order to find a food source in a cost-effective way. The behavior of ant colonies in the foraging process inspires many resource-efficient networking techniques. The need for autonomous operation without infrastructure also contributes to a major challenge in WSNs. Infrastructure free environment calls for a mechanism to track the growing number of nodes in the network to overcome adverse impact of overall network failure. The performance of the network must be assessed before and after every operation executed either statically or dynamically across the network so that networks continue their operations without any interruption due to the potential failures. This adds up a major responsibility on the network towards self-organization, self-evolution, and survivability. In order to tackle these challenges, biological systems provide promising solutions in the context of WSNs.
Swarm Intelligence is based on the study of the collective behavior of distributed and self-organized systems such as ant colonies, swarms of bees or birds, flocks of fishes. Ant colonies exhibit interesting characteristics which are most desirable in the context of WSN management and control. Ant colonies are able to effectively coordinate themselves to achieve specified global objectives without centralized planning or organizational structure. These cooperative behaviors to accomplish the complex tasks emerge from individual ant’s much simpler behaviors and local rules which they follow by instinct. It is evident that the adaptability, flexibility, and robustness exhibited in their behaviors made them capable to solve real-world problems. In the literature [4, 5], several routing protocols with various metrics that use ant colony optimization have been reported. Ant colony optimization is a meta-heuristic approach inspired by the behavior of real ants seeking the path from their colony to the food source. Real ants explore the possible paths between a food source and their colony by depositing pheromones on their return journey to the colony and then follow the shortest path, that is, the path having the highest pheromone trails from colony to the food source. ACO is used to find the optimal path from the source (nest) to the destination (food). Forward ants select the next node randomly. Upon reaching the destination, the forward ant gets converted into backward ant and deposit pheromone trail on the path traversed. The pheromone trail will be more on the shortest path towards food. Here, the mechanism implied by the ants is said to be either random probability based or a heuristic based approach. If the mechanism followed by an ant is found to be successful, then it is adopted; else it is discarded and another path is discovered.
Secure routing is highly demanding in Wireless Sensor Networks due to the nature of routing operation in an infrastructure less environment wherein resource-constrained nodes need to cooperate with each other to route the packets. For most of the mission-critical applications, WSNs are to be deployed in harsh and hostile environments unattended where critical security issues need to be considered due to various types of threats and attacks they are exposed to. In addition to the robust key management schemes used to secure the network from external attacks [6], WSN requires strategies to mitigate the effect of insider attacks by detecting the misbehavior nodes refusing to participate in packet delivery thereby launching non-forwarding attacks. These behavior related attacks can be thwarted by assigning trust rating to nodes in the network based on the reputation they build over a period of time by being trustworthy in participating in the packet delivery. There are several insider attacks or behavior level attacks that target the routing operation in WSN [6]. In the black-hole attack, adversary nodes do not forward packets completely, whereas in a gray-hole attack, malicious nodes selectively forward some packets. Most of the insider attackers are Denial of Service (DOS) attacks [7]. Behavioral level attacks can be mitigated by providing trust enabled routing to prevent non-forwarding attacks by insider misbehaving nodes. Identity-related attacks can be avoided by providing security services based on efficient cryptography approaches to secure data confidentiality and data integrity. The various routing attacks possible against WSN can be stated as follows: Worm Hole Attack where in there is a threat on confidentiality and authenticity; Denial of Service attack (DoS) attack, where there is a threat on the availability, integrity, confidentiality and authenticity; Selective forwarding attack, which creates threat towards availability and integrity; Sink hole, gray hole and Sybil attacks posing threat on availability, integrity and authenticity; Carousel attacks holding a threat on availability, confidentiality and authenticity. Hence, there is a need to use appropriate techniques to protect data and overall network functionality from the aforementioned attacks. The number of packets dispatched correctly from source to destination, the number of packets lost, the amount of energy consumed, the fake addresses generated during the routing process, etc. are various parameters to be considered to deal with WSN attacks.
Most of the conventional networking paradigms are unable to accommodate the scalability, complexity and heterogeneity of modern world real-time scenarios. These challenges are new by-products of evolution in communication technologies in the last few decades. Hence, there is a need to identify the mechanisms that perform suitably well when dealing with a huge set of nodes, with dissimilar behavioral aspects. Particularly when dealing with WSN for insect colonies, individual node responses account for more loads and degrade the performance of the overall network. Hence, to achieve optimality in terms of resource utilization and scalability, there is a need to switch from static to dynamic access strategy. At the other end, the characteristics such as adaptive to the varying environmental circumstances, robust and resilient to failures caused by internal or external factors and self-organization lead to different levels of inspiration from biological systems towards deriving different algorithm approaches and designs at network layer for effective, robust and resilient communication. Majority of the work in the literature captures the laws of dynamics to deal with aforementioned scenarios in the modern world that may result in a probabilistic outcome. The common rationale behind this research is to capture the governing dynamics and understand the fundamentals of biological systems in order to devise new methodologies and tools for designing and managing WSNs that are inherently adaptive to dynamic environments, heterogeneous, scalable, self-organizing and evolvable. Many of the existing works in literature in the WSNs area focus on achieving better outcomes in terms of energy efficiency or optimal routing paths based on the shortest distance or scalability aspect to deal with a huge crowd of packets and nodes or distance based minimization with limited security aspects. In this work, various essential parameters like distance, threshold, energy, link quality with security are integrated to achieve productive outcomes across the network traversal. These solutions are addressed in the proposed methodology in the form of SIBER-XLP with TECB, SIBER-DELTA, and SIBER-DELTAKE.
This chapter is organized as follows—Section 2 provides brief review on the related work in the area of swarm intelligence based secure and trust enabled energy efficient routing for WSNs. Section 3 discusses the SIBER-XLP model which represents Swarm Intelligence Based Efficient Routing protocol for WSN with Improved Pheromone Update Model and Optimal Forwarder Selection Function. This section also presents the Threshold Energy Conservation and Balancing (TECB) approach developed in SIBER XLP model for static and dynamic environments. Section 4 proposes SIBER-DELTA model which is Swarm Intelligence Based Efficient Routing protocol for WSN with Distance, Energy, Link Quality, and Trust Awareness designed to suit the harsh and hostile environment where the WSN nodes are deployed. Section 5 presents SIBER-DELTAKE model, an improved ACO-KM-ECC trust aware routing protocol based on ant colony optimization technique using K-Medoids (KM) algorithm for the formation of clusters and setting up of cluster heads, and Elliptical Curve Cryptography (ECC) mechanism for secure routing with key generation and management which further takes into account Distance, Energy, Link Quality and Trust Awareness in the routing decision. In this hybrid model, both the identity and behavior related attacks are tackled with effective results depicting the overall performance of the proposed work. This is followed by a section on conclusion and future research directions.
Swarm Intelligence area, on which the routing protocols of WSN are based, leads to optimal use of resources in a distributed way. The routing capacity of a protocol is effective if it leads to the minimization of energy and cost of traversal across the nodes. Swarm intelligence based efficient routing (SIBER) is an Ant Colony Optimization (ACO) [8] based routing algorithm for WSN where the forward ants are launched at regular intervals from source node with the mission to locate the sink node with equal probability by using neighbor nodes with minimum cost along the path from source to sink. ACO in integration with WSN achieves better energy saving and reduction in communication overhead. Using variants of the basic ACO, several approaches with different constraints were proposed in the area of ACO based routing algorithms for WSN. In the Energy Efficient Ant Based Routing (EEABR) Protocol proposed in [9], pheromone distribution is used in such a way that nodes nearer to the destination have high pheromone when compared to the other nodes. It suffers from excessive packet delivery delay as it does not take into account link quality. IEEABR [5] is an improved version of EEABR which allows non-optimal paths to be selected for packet transmission, increasing network lifetime and preserving network connectivity, but incurs excessive delay in packet delivery. Sensor Driven and Cost-Aware Ant Routing (SC), Flooded Forward Ant Routing (FF) and Flooded Forward Ant Routing (FF) protocols are proposed in [10]. The SC algorithm is energy efficient but suffers from a low success rate. Flooded Forward Ant Routing, FF Protocol is a multipath routing protocol which uses broadcast method to route packets to the sink by flooding forward ants to the sink. The FF algorithm exhibits shorter time delays, but suffers from generation of significant amount of traffic. Flooded Forward Ant Routing, FF Protocol utilizes constrained flooding of both forward and data ants to route the data and to discover optimal paths. It exhibits high success rate when compared to SC and FF but suffers from high energy consumption. It has been seen from the detailed analysis of various-reported ant colony based routing algorithms for WSN in the literature [4, 5], most of the ant colony based routing techniques do not consider all the parameters to select the best quality path in terms of energy, distance, link quality and other metrics thereby leading to the selection of sub-optimal paths. WSNs form a major source for Internet of Things (IoT) due to their ability to adapt dynamically with the modern world gadgets. The computational capacity of a sensor network depletes while progress is made to transmit data across the nodes in a network. Hence the protocols to route data across the network need to be highly dynamic in nature with the ability to adapt to changes in the environment. Clustering relevant data into similar entities, ability to reduce the size of data by applying mining techniques, increasing the network life time in a robust fashion, dealing with power and network outages across widely distributed geographical locations are some of the parameters that need to be considered while the development of the routing algorithms.
A Reputation system based framework for Energy Efficient, Trust-enabled Secure Routing for Wireless Sensor Network proposed in [10, 11] incorporates a customized reputation system defined as Sensor Node Attached Reputation Evaluator (SNARE). SNARE is a collection of protocols that communicates directly with the network layer and adopts geographical routing principle to cope up with large network dimensions and relies on a distributed trust management system for the detection of malicious nodes. The system consists of three main components—monitoring component, rating component and response component. The monitoring component, observes packet forwarding events. Here a monitoring node will not be in a continuous monitoring mode of operation, rather, it will monitor the neighborhood periodically and probabilistically to save resources. When a misbehaving event is detected, it is counted and stored until an update time and then a report is forwarded to the rating component. The rating component at the other end, evaluates the amount of risk an observed node would provide for routing operation. The risk value is a quantity that represents the previous misbehaving activities that a malicious node (a node that drops packet) obtained. This value is used as an expectation for how much risk would be suffered by selecting that malicious node as a router. Risk values are updated based on the first hand information every time a new misbehavior report is received from the monitoring component. Additionally, if an observed node behavior is idle for a certain period of time, then its risk value is reduced. A monitoring node also updates the risk values of its neighbors by second hand information received periodically from some announcers. Based on the trust relations, a node will try to avoid malicious nodes based on the routing decision made by the routing protocol—Geographic, Energy, Trust Aware Routing protocol (GETAR) [11]. GETAR incorporates the trust information along with distance and energy information (routing decisions are based on a weighted routing cost function which incorporates trust, remaining energy and location attributes) to choose the best next hop for the routing operation thus allowing for better load balancing and network lifetime extension. To design a framework based on reputation for sensor networks, nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. This results in the development of a robust and scalable model in a generalized fashion to deal with defects across the data transmission process. This approach employs Bayesian formulation where probability is of at most significance. Social networking plays a prominent role to determine the trust factor based on reputation of a node. The present and future behavior of nodes in the network can be judged based on the reputation of a particular node [12]. Beta reputation based system is a strong inference based system that enables to set foundation of trust between the people in e-biz world. The performance of such a system can be evaluated by changing the weight across the nodes (small or large), by changing the feedback factor (positive or negative), by changing the discount and forgetting factors (old or new), and an integration of either of these factors, all based on reputation factor of a node. The goodness of this approach is that it is not adhered to any single environment [13]. However, as it also uses probability to calculate the aforementioned parameters, the working of this system cannot assure effective results in real time.
At the other end, authentication and key management schemes are the most important security services to provide data security and data confidentiality in WSN. Techniques such as random key pre-distribution for pair wise key establishment and broadcast authentication to provide security without the expensive Public key cryptography operations is preferable for deployment in traditional networks. However, random key pre-distribution techniques cannot ensure key establishment among any two nodes and endure arbitrary node compromises at the same time. Moreover, it has become highly challenging task to achieve loose time synchronization required by all broadcast authentication schemes in WSNs [14]. In recent years, application of Public key cryptography on resource-restricted sensor networks in the form of Elliptic Curve Cryptography (ECC) has emerged as highest preferred approach among several PKC options as a result of its fast computation, small key size, and compact signatures. ECC is based on mathematical formulation of discrete logarithmic problem that performs scalar computations among the points on the curve. With this kind of computation, it is difficult for the intruders to extract the original message in WSN environment. ECC uses discrete log approach to generate key and to perform encryption and decryption techniques. A data packet can be encrypted using ECC upon discovery of route to the sink node [15]. ECC is further strengthened by the addition of a predetermined threshold values in the method that transmits the information by splitting the original information into several small pieces of information, based on which the appropriate secret key will be generated, making it difficult for third parties to tamper over the network. This method was found to be effective as compared to RSA algorithm for sensor networking environment. However, the size of message piece was chosen in random, without describing any standard methodology to achieve effective threshold based outcomes [16]. An efficient integrity-preserving data aggregation protocol yields better performance in terms of reduction of the communication overhead as compared to the modulo addition based methods. This integrity preserving method in conjunction with Elliptic Curve Cryptography results in achieving the maximum optimum higher bound in a secure way. The proposed work in [17] allows the verification of the authenticity of aggregated data both at the base station and aggregators. However, due to the decryption at aggregators, both these approaches suffer leakage of data privacy. Also, the method developed is applicable to hierarchical structures with level wise arrangement. The algorithm proposed in [18] to construct the optimal network architecture in a cluster form employs Elliptic Curve Cryptography to commute public and private keys using a 176-bit encryption key consisting of combining the node ID, Elliptic curve encryption key, and the distance to its cluster head. Homomorphic encryption is used to allow cluster head to aggregate the encrypted data without having to decrypt them thereby reducing the energy consumption of cluster heads. This proposed technique greatly improves the network lifetime, memory requirements, communication overhead, and energy consumption. The ECC can in turn be integrated with other Message Authentication Code (MAC) to enhance the level of security through authentication [19].
WSNs where the sensor nodes combine their data to form a global environment include base stations that process the data collected across various nodes. This may result in depletion of huge amounts of energy and scalability issues. The solution to overcome this problem is through integration of clustering algorithms. Various heuristic based clustering methods that enable the reduction in energy consumption include linked clustering, hierarchical clustering and weighted clustering algorithms like highest connectivity based clustering, Max-Min Clustering, LEACH method, etc. The linked clustering algorithms like LCA and LCA2 work well in the scenarios where there is a unique identity assigned to each node in the cluster. However, there may be limited number of clusters or nodes per cluster, making it difficult to work in dynamic environment [20]. In Highest Connectivity clustering method, the cluster head is selected based on the highest degree of a node. The clusters once chosen to act as a master may in turn act as a slave if new cluster head is elected. At the other end, in max-min clustering, stable masters and large clusters can be created with huge set of messages delivered across each node from source to destination. In weighted clustering algorithm, the mobility and transmission energy of a node enable to elect a cluster head. Large amount of energy is consumed as the cluster head is selected based on the combined weight of each node. In Low Energy Adaptive Clustering Hierarchy (LEACH) and Two Level LEACH, cluster head is chosen dynamically with local computation being carried out at each node. At the other end, distributed cluster head is elected at consuming more power in Energy Efficient Clustering Scheme. There is little or no control over the cluster head in this clustering method. In Power Efficient Gathering in Sensor Information Systems (PEGASIS), large number of nodes in a cluster can be formed, which leads to high energy efficiency but leads to long delays when the chain (huge number of connected nodes) is long. In our proposed model, k-medoids clustering is chosen that overcomes the drawbacks of the aforementioned methods, as the appointment of cluster head is done based on the distance of the data points from cluster center and hence there is no consumption of higher energy or dissipation of high power, resulting in constant performance across the nodes suitable for wireless sensor networking environment. The selection of a cluster head varies from one protocol to the other, with probability based approach being the most common one to estimate the energy level and power consumption level of a particular node in heterogeneous environment [21]. Efficient routing technique is regarded as the one that develops shortest path between the cluster head and sink, leading to the development of optimal path. Also, the energy consumption of sensor nodes in WSN can be minimized using clustering techniques where nodes with similar properties form a cluster and are close in resemblance to each other. The election of a cluster head in various clustering techniques can be made based on either a probability model or a fuzzy rule selection [22]. Fuzzy logic is built around a set of inference rules that enable to measure various parameters like distance, probability, density of a node, etc.
This section deals with the proposed model SIBER-XLP: Swarm Intelligence based Efficient Routing for WSN with Improved Pheromone Update Model (PUM) and Optimal Forwarder Selection Function (FSF). SIBER-XLP model considers the link quality of the path along with energy and distance to select the shortest path from source to destination. It has been observed from our detailed analysis of various reported ant colony based routing algorithms for WSN that the Forwarder Selection Function to select a node for packet forwarding and Pheromone update model need to be revisited. SIBER-XLP includes two variants named as SIBER-ELP having Equal Link Probability signifying the routing scheme for sensor nodes deployed in Normal Environment like schools, hospitals, commercial organizations etc., and SIBER-VLP having Variable Link Probability signifying the routing protocol for sensor nodes deployed in Harsh Environment like defense, battle fields etc. Depending on the environment where they are deployed and the prevailing networking conditions, it is noticed that link quality and other related parameters may vary which are not taken into account when selecting the next forwarder by various ant colony based routing algorithms for WSN in the literature as in [4, 5, 8, 9, 21, 22, 23]. By considering these problems into account, the proposed work in this section suggests an improved FSF, in order to select the best next neighbor to forward the packet to the sink node. It is also observed that the PUM model varies from one algorithm to another as the parameters used in the computation of the amount of pheromone concentration to be placed on the path traversed by the backward ant differ. Further, it is found that the amount of pheromone computed to be placed on the path during return journey is not proper to reflect that path as an optimal one, during the simulation period. In general, a strongest path must have more pheromone when compared to weakest path and the variations in pheromone concentration should be such that always strongest path is selected. Keeping these considerations in mind, PUM model is designed with the metrics—minimum and average energy of the nodes along the path, number of hops (i.e., distance indicating shortest path), and link quality of the path, which are collected during their journey from source to sink.
The proposed model SIBER-XLP [24] consists of two main components FSF and PUM. In this architecture, a node to traverse considers the path of its neighbors on both the sides and then proceeds accordingly based on various control parameters like alpha (α), beta (β) and gamma (γ). The SIBER-XLP architecture is depicted in Figure 1.
SIBER-XLP model architecture.
FSF uses a probabilistic approach at every node along the path from source to sink node in the network to select the best next neighbor to forward the packet to the sink node. The Forwarder Selection Function must always choose an optimal path from source to the sink to forward the packets with the sole objective to improve the Network Lifetime by balancing the energy among the nodes in the network to ensure that some nodes along the path do not get depleted fast (resulting in Network disconnections or partitioning) and at the same time selecting good quality links along the path to guarantee that node energy is not wasted due to too frequent retransmissions. Further, selection of shortest paths involving less number of nodes results in saving of energy due to the participation of few set of nodes in packet forwarding. FSF uses a probabilistic approach to select the best node among neighboring nodes to forward the information based on Pheromone Trail (PT), Node Energy level (EN) and node link quality (LP). PT function represents the concentration of pheromone deposited on the path between the nodes, that is, current node and its neighbor node considering Energy, distance and link quality along the path from source to destination. In other words, higher PT represents the better quality path from source node to the destination in terms of energy, distance and link quality. EN function represents the energy level of the neighbor node and LP function represents the quality of the link between the current node and the neighbor node.
Hence, FSF (
where
Link Probability
where
Let
where
Threshold Energy
It is observed that the amount of pheromone computed to be placed on the path during return journey is not efficient to reflect that path as an optimal one, during the simulation period. Strongest path should have largest amount of pheromone whereas weakest path should have least amount of pheromone or almost zero. Among the competing stronger paths for selection, the variations in pheromone concentration should be such that always strongest path (i.e., optimal) is selected. Taking this into consideration, improved PUM model with the following parameters collected by the forward ant is developed—
Higher average and minimum energy of nodes along the traversed path would result in a good quality path in terms of Energy.
Pheromone Update Function,
Equation (8) extracts the impact of average and minimum energy of the nodes along the optimal path. In other way, good quality optimal paths having high average and minimum energy will result in large amount of pheromone deposition on the path. If destination node is reached, then forward ant is converted to backward ant and the traversed path is updated by improved Pheromone Update Function (ΔPT).
At instances where nodes nearer to the destination are supposed to have higher pheromone deposition as compared to the nodes nearer to source, ΔPT computed in (8) is updated by the backward ant in the following fashion:
where
Whenever a node
where, ρ is a decay coefficient and (1- ρ) represents the evaporation of Pheromone trail since the last time
SIBER-XLP model with static and dynamic deployment of nodes is implemented and simulated using NS-2. To evaluate the performance of proposed model, initial scenario with random network topology is chosen to carry out the experiment with random way point mobility model selected to progress at a specified speed. The network size with 25, 50, 75 and 100 nodes is considered to demonstrate the effectiveness of results. The results obtained by the implementation of the proposed work are compared against the existing EEARB model in [9] to evaluate the efficiency of the proposed work. The parameters chosen to determine the effectiveness of the proposed model are Energy efficiency abbreviated as EE, Minimum Available Energy represented as ME, Latency shown as LT, Packet Delivery Ratio represented as PDR. The behavior of nodes in static and dynamic environments against parameters EE, ME, PDR, LT is shown in Figures 2 and 3. The results show the effectiveness of SIPER-VLP model against the other models like SIBER-ELP and EEABR for a maximum of 100 nodes. Figures 2(a) and 3(a) show a significant increase in energy efficiency for both SIBER-ELP and SIBER-VLP models when compared with EEABR in static environment, while still showing greater increase in energy efficiency in dynamic environment. As evident from Figures 2(b),(d)
(a) Static EE evaluation. (b) Static ME evaluation. (c) Static LT evaluation. (d) Static PDR evaluation.
(a) Dynamic EE evaluation. (b) Dynamic ME evaluation. (c) Dynamic LT evaluation. (d) Dynamic PDR evaluation.
Extending the life of a wireless sensor network is critical to important applications such as battlefield surveillance where the nodes of the network must continue to be monitored and reported for a maximum period rather than getting exhausted in a less span of time, leading to interruptions in the network, division due to depletion of energy, etc. Due to the constraints exhibited by nodes of the WSN, it is necessary to utilize energy in an efficient way by introducing novel techniques and approaches to extend the lifetime of the WSN [25, 26]. In this section, the significance of the conservation of energy and its balancing using threshold energy concept (TECB) among nodes [27, 28] in SIBER-XLP is presented. The basic assumption taken here is that every node can participate in packet forwarding process if and only if it has sufficient energy larger than the threshold energy (
In general, any application can be viewed with three different kinds of traffic—low level, medium level and high level. Eth can be set to these three levels in different scenarios. For low level traffic scenario, Eth can be raised to a high value, i.e. 70–80% of the energy, for the active nodes participating in the forwarding process with the intention that only little fraction of their energy can be utilized. Likewise, medium level traffic, Eth can be adjusted to a medium level value, i.e., 50% of the available energy, and then only 50% of the battery energy will be utilized. For high level traffic scenarios, a small value can be fixed for Eth, i.e. 20–30%, as a result nodes participating in packet forwarding process will have more energy available for utilization.
The role of Eth is to limit the amount of power from the nodes that will be provided for use in accordance with the capabilities in a heterogeneous network. This would help to maintain the capacity of the less proficient nodes by involving them only when needed. In addition, nodes with higher capacity are involved in routing until its capacity reaches Eth. One may not generally have balanced paths to reach the sink with a nearly identical hop count or latency in a multipath routing. Because of the preference given to smaller distance paths with nodes having high power, the shorter paths will be chosen normally, as a result a fast decrease in the node’s power in the path selected caused by the improper energy or load balance. Here, Eth parameter helps neighboring nodes to non-participate in forwarding packets if node’s energy becomes equal/or less than Eth. This Eth control attribute conserves energy in the nodes for nearly future purpose and allows less leading nodes in the neighborhood to involve in the routing process until their levels of capacity attain Eth, hence conservation and balancing of energy is achieved among the neighbor nodes all the time. NS-2 Simulator is used to find the performance of the network under varying load or traffic. Based on the load, it is decided to adjust the Eth value of the nodes in order to conserve and balance energy by involving all the nodes alternatively in data forwarding process. In this simulation, three different kinds of traffic – low level, medium level and high level are considered. Eth can be set to these three levels in different scenarios. For low level traffic scenario, Eth can be raised to a high value (20 J) as initial energy is set to 30 J, i.e. 70% of the energy, for the active nodes participating in the forwarding process with the intention that only little fraction of their energy can be utilized. Likewise, medium level traffic, Eth can be adjusted to a medium level value, i.e., 50% of the available energy (15 J), and then only 50% of the battery energy will be utilized. For high level traffic scenarios, a small value can be fixed for Eth (10 J), i.e. 30% of the initial energy, as a result nodes participating in packet forwarding process will have more energy available for utilization. In this simulation, the network performance, i.e. energy consumption is computed and how long the network is alive is seen based on the Eth value for different types of applications based on the traffic or load. Energy consumption graphs in Figure 4 show that with the increase in simulation time, energy consumption increases which is not beyond Eth and number of nodes involved in forwarding the packet also increases. It is clear from the graphs that the nodes balance energy along both shorter and longer paths by setting Eth to only a particular value such as 10 J of energy, 15 J of energy or 20 J of energy which is accessible at each node. Same amount of energy is available on all the participating nodes at the end of the simulation period. This results in balancing energy and conserving energy, thus prolonging the lifetime of the network. There is 66% of initial energy conservation in the network for Eth = 20 J. For Eth = 15 J, there is 50% and 33% for high traffic scenarios having Eth = 10 J. Energy decreases with the rise in time, but does not fall below threshold energy in each and every case.
Siber-VLP with TECB.
Prolonging the network lifetime with the introduction of Threshold Energy concept alone is not sufficient for WSN as seen in the SIBER-XLP Model because of their constraints such as limited battery energy, limited memory, security threats, etc. As all the nodes are involved in the packet forwarding process, there is a security threat occurring from the insider nodes. In mission critical applications like military, health or commercial applications, nodes play a vital role to carry and deliver very critical and secret data. But, when a node gets compromised and misroutes the data to a wrong destination, it leads to loss of information. Also, misbehavior of nodes in the network can cause performance degradation resulting in non-forwarding attacks. There will be reduction in the system throughput with these attacks as packets need to be retransmitted many times if they are not delivered. Denial of service attacks can increase the delay in delivering the packets because some nodes which are used as forwarders may be busy in replying to the attacks and forced to delay the processing of other packets. With such attacks, network can be partitioned and communication may not take place. Finally, misbehaving nodes could also affect resources of the network by making the resource unavailable for routing. Denial of Service attacks force the adversary nodes to consume more energy during packet reception and processing unnecessarily. To tackle these misbehaving nodes in the network, SIBER-DELTA (Swarm Intelligence Based Efficient Routing protocol for WSN with Distance, Energy, Link quality and Trust Awareness) is developed as an extension to SIBER-XLP to safeguard data exchange and secure data delivery. The concept of trust comes into picture in an open environment where the nodes are exposed to different types of attacks such as eavesdropping, non-forwarding attacks, denial of service attacks, etc. Hence, it is now essential to design a trust enabled routing model taking into consideration distance, energy and link quality. The proposed SIBER-DELTA Model [29] is shown in Figure 5.
SIBER-DELTA model.
SIBER-DELLTA Model has three components such as FSF, PUM and Trust Model (TM). The trust evaluation starts by an assumption that links in the network are bidirectional. Initially each node is associated with a trust value of 1 as no data transmission happens. As and when data forwarding takes place, there comes the trust model for evaluating a node’s performance. There are two types of information obtained from the nodes of the network by the source node. One is the information received from its direct interaction with the neighbor whom it is sending data which is stated as First Hand Information (FHI). The other is the information received from the remaining neighbors of the source node except the direct neighbor which is stated as Second Hand Information (SHI). The source node calculates the Forwarding Misbehavior Index (FMI) of a node by recording all the information regarding data forwarded and data received. Mistrust Index is then calculated with the help of weighted average of FMI based on FHI and SHI. With these calculations, current trust rating of a node is depicted. Over a period of simulation time, a new current trust rating is also calculated based on their behavior in the past, so as to provide some incentives to the node for active participation or punishments to the node for misbehaving such as packet dropping. At last, final trust value of a node is calculated based on weighted average of the new current trust value and average of its trust rating in the past history. This allows handling of selective forwarding attacks in a smooth fashion. Instead of completely avoiding nodes in the routing process as done in the case of Black Hole attacks, the final trust calculation helps the selective forwarding nodes to improve their trust values based on their past history.
The nodes in the network are initially assigned a trust value of 1. Upon the data forwarding from one node to another node, trust values are altered. The information received from direct neighbors and indirect neighbors allows calculating Forwarding Misbehavior Index of each neighbor node.
Forwarding Misbehavior Index (FMI) based on Direct Interaction (FHI) is given by:
where
FMI based on Indirect Interaction (SHI) is given by:
Mistrust Index (MI) is a weighted average calculation of both FMI based on FHI and SHI. Based on value of the weighted coefficient used, importance will be given to either FHI or SHI. For equal importance of FHI and SHI, the weighted coefficient must be assigned 0.5, as it lies between 0 and 1.
Current Trust Rating (CTR) of a node
New Trust Rating based on previous Trust Rating (NTR) is a weighted average calculation of the previous trust rating of a node
This is calculated because, upon the time consumption, there may be changes taking place in the node behavior. So as to provide some incentives to the node for active participation or punishments to the node for misbehaving such as packet dropping, this NTR is framed.
Final Trust Rating based on Past History (FTR) of a node is calculated based on weighted average of the New Current Trust Rating value and Average Trust Rating of node
Instead of completely avoiding nodes in the routing process, as of Black Hole attacks, the Final Trust Calculation helps the selective forwarding nodes to improve their trust values based on their past history.
Forwarder Selection Function is similar to the previously described Forwarder Selection Function in the SIBER-XLP model but with an additional trust parameter included.
The Pheromone Update Function is also similar to the previously described Pheromone Update Function in the SIBER-XLP model but with an additional Path Trust Rating parameter included.
Our proposed system, SIBER-DELTA was simulated using open source NS-2 simulator. In this simulation, we have considered static and dynamic network scenarios with random topology with nodes randomly distributed. Random way-point mobility model is used for dynamic network with the nodes having the ability to move with a specified speed.
Our proposed trust enabled routing approach SIBER-DELTA is compared with SIBER-VLP [24] without trust awareness for varying network sizes (dimension)—50 and 100 nodes by introducing 10, 20, and 30% non-forwarding attackers in the network. It is assumed that all the methods use the same data rate. The performance evaluation metrics used in this simulation are Packet Delivery Ratio, Latency, Dropped packets, Average Energy Consumed, Average Energy Remaining, Minimum Energy, Energy Efficiency(Kb/J), and Standard Deviation. In our model, all nodes are assigned initially equal trust rating during the initialization and setup phase. The Performance of the network with 50 nodes and 100 nodes in both static and dynamic scenarios are shown in Figures 6 and 7, respectively. It is clearly seen from the simulation results that SIBER-DELTA model with trust implementation exhibits high packet delivery ratio. By avoiding completely untrusted nodes and considering only trusted nodes (i.e., nodes with higher trust rating) along the paths from source to sink, SIBER-DELTA is able to achieve a high success rate of 99.51% with 10% attackers, 98.88% with 20% attackers and 98.35% with 30% attackers in the network. Since very less number of packet drops are observed during the entire simulation, it can be concluded that SIBER-DELTA performs extremely well by detecting all malicious nodes along the paths from source to sink and preventing these untrusted nodes from packet forwarding completely to achieve higher observed success rate. As evident from simulation results, SIBER-DELTA shows higher Energy Efficiency in the case of 10 and 20% attackers and slightly lower Energy Efficiency for 30% attackers as it consumes slightly higher energy due to the selection of longer alternate paths with more nodes to avoid black holes.
Performance of the network (NS = 50 nodes).
Performance of the network (NS = 100 nodes).
SIBER-DELTAKE [30] Hybrid Routing protocol for WSN, an extension to trust aware routing model SIBER-DELTA is presented in this section which uses K-medoids clustering technique integrated with ECC to enhance security while selection of cluster head. This prevents the intruders from tampering the confidential information traversed across the network. This enables the early detection and termination of malicious nodes, based on the computation of values. WSN in IoT era is highly susceptible to security attacks due to huge data generation in modern era. To achieve better security, ECC is used in conjunction with authentication, key generation, group management, random number generation and key distribution techniques there by strengthening the existing security options. This will also result in better energy utilization when considering big data environment [31]. The system flow diagram of the proposed model is shown in Figure 8. In this approach, k-medoid clustering algorithm is chosen to select the cluster head and other members of the cluster family based on the calculation of distance between the midpoint and the sink node of the cluster. Once this is done, SIBER-DELTA mechanism is applied to update the FSF and PUM of a node. Finally, a node is permitted to transmit data based on its trust value. If the trust value of a node ready to transmit is high, then before transmission of data, it is encrypted using ECC algorithm. At the other end, if the trust value is obtained low, then the node under consideration is discarded, being regarded as a malicious node. The proposed model deals with identification of attacks and performs the following simplified steps—Initialization Phase involving network deployment, Clustering Phase using K-Medoids Algorithm, Routing Phase using SIBER-DELTA Protocol and Packet Forwarding Phase using Elliptic Curve Cryptography Technique.
SIBER DELTAKE system model.
Our model SIBER-DELTAKE uses K-medoids algorithm for the formation of clusters and selection of cluster heads.
The most desired approach in WSN to implement public key cryptography is ECC which is based on the algebraic structure of elliptic curves over limited fields [33]. An elliptic curve over prime field Fp, where p is a large prime number, is defined by a cubic equation of the form y2 = x3+ ax + b where a, b ∈ Fp are integers that satisfy the equation 4a3 + 27b2 ≠ 0. To have ECC based secure communication, every sensor node in the network must know an elliptic curve in addition to base point p which lies on the curve. It is assumed here that during the initial setup or the initialization phase, the elliptic curve parameters and also the base point p are loaded before only into the memory of every sensor node. Every node chooses a random prime integer as its private key and generates its public key by multiplying the private key by the base point p in order to have a secure communication between a pair of nodes. As cluster heads are involved in receiving the encrypted data from their members of cluster, then processing the data to perform data aggregation and finally forwarding the aggregated data to the base station, they consume more energy when compared to the member nodes. In order to reduce the energy consumption by cluster heads, cluster heads combine the encrypted message arriving from the members of the cluster and use Homomorphic encryption to perform aggregation of the encrypted data with no decryption thereby reducing the energy consumption of cluster heads. This results in saving of more energy and much stronger privacy of data as attackers will not be capable to hack data from intermediary nodes.
Our proposed hybrid model SIBER-DELTAKE was simulated using NS-2 simulator by considering static network scenarios with network sizes of 25, 50 and 100 nodes randomly distributed in the network area of 1000x500 m2. Our proposed SACO-KM-ECC based SIBER-DELTAKE system is compared with SIBER-DELTA [28] with trust awareness and SIBER-VLP [22] without trust awareness for varying network sizes by introducing 10, 20, and 30% attackers in the network. The performance of the network is evaluated using the following metrics—Packet Delivery Ratio, End to End Delay, Energy Consumption and Throughput. It is evident from the plots in Figure 9(a) that SIBER-DELTAKE and SIBER-DELTA models exhibit high packet delivery ratio and SIBER-DELTAKE performing better than SIBER-DELTA as more trusted and secure optimal paths are selected to forward the packets resulting in higher performance. As it is seen from simulation results, SIBER-VLP model exhibits performance degradation as malicious nodes are introduced in the network. As the number of malicious nodes increase, an increase in packet drops is observed due to the presence of more malicious nodes in the paths selected by the ants. It can be seen from Figure 9(d) that SIBER-DELTAKE consume little more energy when compared to SIBER-VLP and SIBER–DELTA but it is reasonable considering the fact that hybrid model needs to perform ECC computation to provide data confidentiality and data Integrity in the presence of trust awareness. Though packet delivery ratio is less in SIBER-VLP, but the comparable energy consumption in this case may be due to both packet routing and packet retransmissions. As far as the end to end delay is considered, it can be seen from Figure 9(c) that hybrid model has low delay when compared to other models as it selects always the most trusted and secure optimal paths. Moreover, as the number of nodes increases, there will be more number of alternate paths available to route the packets so that the malicious nodes along the selected paths can be avoided. It is clear from the Figure 9(b) that SIBER-DELTAKE has higher throughput when compared to SIBER-DELTA and SIBER-VLP. SIBER-VLP performs very poorly in the existence of larger malicious or faulty nodes in the network.
(a) Effect of malicious nodes on PDR-50 nodes. (b) Effect of malicious nodes on TP-50 nodes. (c) Effect of malicious nodes on LT– 50 nodes. (d) Effect of malicious nodes on EC-50 nodes.
In this chapter, swarm intelligence and social insects based approaches are presented to deal with bio-inspired networking framework. The proposed approaches are designed to tackle the challenges and issues in the WSN field such as large scale networking, dynamic nature, resource constraints and the need for infrastructure-less and autonomous operation having the capabilities of self-organization and survivability. This research work presents the necessity to consider a combination of evaluation parameters for efficient routing of packets from source to destination with the development of SIBER-XLP with TECB, SIBER-DELTA and SIBER-DELTAKE models, each one emerging as an improved extension over the other. NS2 simulation environment was used to develop the entire work. The outcomes achieved in terms of results can serve as a contribution to the research community in the area of WSN with further levels of security to be integrated in future due to the voluminous data generation in modern world with the development of IOT applications. Also, in this work, a set of parameters like packet delivery ratio, latency, throughput, energy consumption, minimum available energy are evaluated against a collection of nodes. In future, a different set of parameters like load balancing across the nodes in a cluster, multi-level security aspects in WSN can be developed.
Another interesting and fascinating research direction is the application of Blockchain technology in WSN area. The blockchain technology enables peer to peer transfer of digital assets without any intermediaries and was originally created to support the famous cryptocurrency, Bitcoin. With the rapid development of Ethereum platform in recent years, the blockchain has permeated a broad range of applications across many industries and poised to innovate and transform a wide range of applications including finance, healthcare, government, manufacturing and distribution namely supply chain, digital media transfer, remote service delivery, platform for decentralized business, distributed resources, identity management, etc. The blockchain infrastructure establishes a trust among the peers in a decentralized system by having a process in place to validate, verify, and confirm transactions, record the transactions in a distributed ledger of blocks, create a tamper-proof record of blocks, chain of blocks, and implement a consensus protocol for agreement on the block to be added to the chain. Thus, validation, verification, consensus, and immutable recording lead to the trust and security of the blockchain. Though the application of block chain technology to WSN is in its initial stages, there has been research reported lately in the literature [34, 35] of using blockchain technology in peer authentication and trust level management for decentralized sensor networks. The blockchain infrastructure has shown tremendous advantages in a distributed decentralized network, but due to the limited computational power, battery life, bandwidth and more importantly storage, it may not be realistic to include all the blockchain features. In order to adopt a blockchain in WSN, we need to closely examine the operations involved in the blockchain implementation. For every transaction, a block is to be created, stored, source/sink node and transaction are to be validated & verified, broadcasted in a peer to peer network environment for block update. The role of the miners is most important to determine a valid block to be added to the blockchain using a consensus protocol based on a simplified Proof-Of-Work or Proof-Of-Stake (need to avoid biased or selfish nodes colluding to stake claim) approach which calls for having high capacity, powerful nodes to act as miners in WSN. Considering the challenges and issues with respect to the use of blockchain technology, another important network model decision would be the deployment of hierarchical sensor network with efficient clustering approach. Hence, there is a stronger need to design and develop efficient frame work and techniques to tackle the huge challenges and issues faced by blockchain technology in Wireless Sensor Network as WSN has emerged as the core component of IOT area.
We are grateful to INHA University Global Education Project Group, Incheon, South Korea for all the support and funding provided for the publication of this research work.
"I work with IntechOpen for a number of reasons: their professionalism, their mission in support of Open Access publishing, and the quality of their peer-reviewed publications, but also because they believe in equality. Throughout the world, we are seeing progress in attracting, retaining, and promoting women in STEMM. IntechOpen are certainly supporting this work globally by empowering all scientists and ensuring that women are encouraged and enabled to publish and take leading roles within the scientific community." Dr. Catrin Rutland, University of Nottingham, UK
",metaTitle:"Advantages of Publishing with IntechOpen",metaDescription:"We have more than a decade of experience in Open Access publishing. \n\n ",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"We have more than a decade of experience in Open Access publishing. The advantages of publishing with IntechOpen include:
\\n\\nOur platform – IntechOpen is the world’s leading publisher of OA books, built by scientists, for scientists.
\\n\\nOur reputation – Everything we publish goes through a two-stage peer review process. We’re proud to count Nobel laureates among our esteemed authors. We meet European Commission standards for funding, and the research we’ve published has been funded by the Bill and Melinda Gates Foundation and the Wellcome Trust, among others. IntechOpen is a member of all relevant trade associations (including the STM Association and the Association of Learned and Professional Society Publishers) and has a selection of books indexed in Web of Science's Book Citation Index.
\\n\\nOur expertise – We’ve published more than 4,500 books by more than 118,000 authors and editors.
\\n\\nOur reach – Our books have more than 130 million downloads and more than 146,270 Web of Science citations. We increase citations via indexing in all the major databases, including the Book Citation Index at Web of Science and Google Scholar.
\\n\\nOur services – The support we offer our authors and editors is second to none. Each book in our program receives the following:
\\n\\nOur end-to-end publishing service frees our authors and editors to focus on what matters: research. We empower them to shape their fields and connect with the global scientific community.
\\n\\n"In developing countries until now, advancement in science has been very limited, because insufficient economic resources are dedicated to science and education. These limitations are more marked when the scientists are women. In order to develop science in the poorest countries and decrease the gender gap that exists in scientific fields, Open Access networks like IntechOpen are essential. Free access to scientific research could contribute to ameliorating difficult life conditions and breaking down barriers." Marquidia Pacheco, National Institute for Nuclear Research (ININ), Mexico
\\n\\nInterested? Contact Ana Pantar (book.idea@intechopen.com) for more information.
\\n"}]'},components:[{type:"htmlEditorComponent",content:'We have more than a decade of experience in Open Access publishing. The advantages of publishing with IntechOpen include:
\n\nOur platform – IntechOpen is the world’s leading publisher of OA books, built by scientists, for scientists.
\n\nOur reputation – Everything we publish goes through a two-stage peer review process. We’re proud to count Nobel laureates among our esteemed authors. We meet European Commission standards for funding, and the research we’ve published has been funded by the Bill and Melinda Gates Foundation and the Wellcome Trust, among others. IntechOpen is a member of all relevant trade associations (including the STM Association and the Association of Learned and Professional Society Publishers) and has a selection of books indexed in Web of Science's Book Citation Index.
\n\nOur expertise – We’ve published more than 4,500 books by more than 118,000 authors and editors.
\n\nOur reach – Our books have more than 130 million downloads and more than 146,270 Web of Science citations. We increase citations via indexing in all the major databases, including the Book Citation Index at Web of Science and Google Scholar.
\n\nOur services – The support we offer our authors and editors is second to none. Each book in our program receives the following:
\n\nOur end-to-end publishing service frees our authors and editors to focus on what matters: research. We empower them to shape their fields and connect with the global scientific community.
\n\n"In developing countries until now, advancement in science has been very limited, because insufficient economic resources are dedicated to science and education. These limitations are more marked when the scientists are women. In order to develop science in the poorest countries and decrease the gender gap that exists in scientific fields, Open Access networks like IntechOpen are essential. Free access to scientific research could contribute to ameliorating difficult life conditions and breaking down barriers." Marquidia Pacheco, National Institute for Nuclear Research (ININ), Mexico
\n\nInterested? Contact Ana Pantar (book.idea@intechopen.com) for more information.
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5822},{group:"region",caption:"Middle and South America",value:2,count:5288},{group:"region",caption:"Africa",value:3,count:1761},{group:"region",caption:"Asia",value:4,count:10549},{group:"region",caption:"Australia and Oceania",value:5,count:909},{group:"region",caption:"Europe",value:6,count:15941}],offset:12,limit:12,total:119467},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"title"},books:[{type:"book",id:"10818",title:"21st Century Approaches to Management and Accounting Research",subtitle:null,isOpenForSubmission:!0,hash:"dd81bc60e806fddc63d1ae22da1c779a",slug:null,bookSignature:"Dr. Nizar Mohammad Alsharari",coverURL:"https://cdn.intechopen.com/books/images_new/10818.jpg",editedByType:null,editors:[{id:"231461",title:"Dr.",name:"Nizar",surname:"Alsharari",slug:"nizar-alsharari",fullName:"Nizar Alsharari"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10771",title:"Advancements Towards Sustainability of HVAC & R Systems",subtitle:null,isOpenForSubmission:!0,hash:"0718b748e10605d793d244c62797acf4",slug:null,bookSignature:"Dr. Ahmed Niameh Mehdy Alhusseny, Dr. Qahtan Al-Aabidy and Dr. Adel Gharib Nasser",coverURL:"https://cdn.intechopen.com/books/images_new/10771.jpg",editedByType:null,editors:[{id:"208783",title:"Dr.",name:"Ahmed",surname:"Alhusseny",slug:"ahmed-alhusseny",fullName:"Ahmed Alhusseny"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10773",title:"Advances in Fatigue and Fracture Testing and Modelling",subtitle:null,isOpenForSubmission:!0,hash:"22eb4fe235e1d5d074c3ad7643f8a567",slug:null,bookSignature:"Dr. Zak Abdallah and Dr. Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10773.jpg",editedByType:null,editors:[{id:"201670",title:"Dr.",name:"Zak",surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10370",title:"Advances in Fundamental and Applied Research on Spatial Audio",subtitle:null,isOpenForSubmission:!0,hash:"f16232a481c08a05cc191ac64cf2c69e",slug:null,bookSignature:"Dr. Brian FG Katz and Dr. Piotr Majdak",coverURL:"https://cdn.intechopen.com/books/images_new/10370.jpg",editedByType:null,editors:[{id:"278731",title:"Dr.",name:"Brian FG",surname:"Katz",slug:"brian-fg-katz",fullName:"Brian FG Katz"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11000",title:"Advances in Mass Transfer",subtitle:null,isOpenForSubmission:!0,hash:"f9cdf245988fe529bcab93c3b1286ba4",slug:null,bookSignature:"Prof. Badie I. Morsi and Dr. Omar M. Basha",coverURL:"https://cdn.intechopen.com/books/images_new/11000.jpg",editedByType:null,editors:[{id:"174420",title:"Prof.",name:"Badie",surname:"Morsi",slug:"badie-morsi",fullName:"Badie Morsi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10985",title:"Agro-Economic Risks of Phytophthora and an Effective Biocontrol Approach",subtitle:null,isOpenForSubmission:!0,hash:"5ce2fdab78f95851db363572e8e44e36",slug:null,bookSignature:"Dr. Waleed Mohamed Hussain Abdulkhair",coverURL:"https://cdn.intechopen.com/books/images_new/10985.jpg",editedByType:null,editors:[{id:"175713",title:"Dr.",name:"Waleed Mohamed Hussain",surname:"Abdulkhair",slug:"waleed-mohamed-hussain-abdulkhair",fullName:"Waleed Mohamed Hussain Abdulkhair"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10701",title:"Alkenes - Recent Advances, New Perspectives and Applications",subtitle:null,isOpenForSubmission:!0,hash:"f6dd394ef1ca2d6472220de6a79a0d9a",slug:null,bookSignature:"Dr. Reza Davarnejad",coverURL:"https://cdn.intechopen.com/books/images_new/10701.jpg",editedByType:null,editors:[{id:"88069",title:"Dr.",name:"Reza",surname:"Davarnejad",slug:"reza-davarnejad",fullName:"Reza Davarnejad"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10664",title:"Animal Reproduction",subtitle:null,isOpenForSubmission:!0,hash:"2d66af42fb17d0a6556bb9ef28e273c7",slug:null,bookSignature:"Prof. Yusuf Bozkurt and Dr. Mustafa Numan Bucak",coverURL:"https://cdn.intechopen.com/books/images_new/10664.jpg",editedByType:null,editors:[{id:"90846",title:"Prof.",name:"Yusuf",surname:"Bozkurt",slug:"yusuf-bozkurt",fullName:"Yusuf Bozkurt"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10764",title:"Antenna Systems",subtitle:null,isOpenForSubmission:!0,hash:"2fbf1c7a5d92723f08198fc9b526a8ad",slug:null,bookSignature:"Prof. Hussain Al-Rizzo and Assistant Prof. Said Abushamleh",coverURL:"https://cdn.intechopen.com/books/images_new/10764.jpg",editedByType:null,editors:[{id:"153384",title:"Prof.",name:"Hussain",surname:"Al-Rizzo",slug:"hussain-al-rizzo",fullName:"Hussain Al-Rizzo"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10874",title:"Antimicrobial Peptides",subtitle:null,isOpenForSubmission:!0,hash:"23ca26025e87356a7c2ffac365f73a22",slug:null,bookSignature:"Dr. Shymaa Enany, Dr. Jorge Adrian Masso-Silva and Dr. Anna Savitskaya",coverURL:"https://cdn.intechopen.com/books/images_new/10874.jpg",editedByType:null,editors:[{id:"81926",title:"Dr.",name:"Shymaa",surname:"Enany",slug:"shymaa-enany",fullName:"Shymaa Enany"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10997",title:"Arsenic",subtitle:null,isOpenForSubmission:!0,hash:"a40cc5d83f2f1233db31ef10c547b35c",slug:null,bookSignature:"Dr. Margarita Stoytcheva and Dr. Roumen Zlatev",coverURL:"https://cdn.intechopen.com/books/images_new/10997.jpg",editedByType:null,editors:[{id:"170080",title:"Dr.",name:"Margarita",surname:"Stoytcheva",slug:"margarita-stoytcheva",fullName:"Margarita Stoytcheva"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10711",title:"Arthroscopy",subtitle:null,isOpenForSubmission:!0,hash:"afa83f11ba2442e7612f5b8c6aa3c659",slug:null,bookSignature:"M.D. Carlos Suarez-Ahedo",coverURL:"https://cdn.intechopen.com/books/images_new/10711.jpg",editedByType:null,editors:[{id:"235976",title:"M.D.",name:"Carlos",surname:"Suarez-Ahedo",slug:"carlos-suarez-ahedo",fullName:"Carlos Suarez-Ahedo"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:28},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:8},{group:"topic",caption:"Business, Management and Economics",value:7,count:4},{group:"topic",caption:"Chemistry",value:8,count:9},{group:"topic",caption:"Computer and Information Science",value:9,count:10},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:10},{group:"topic",caption:"Engineering",value:11,count:27},{group:"topic",caption:"Environmental Sciences",value:12,count:3},{group:"topic",caption:"Immunology and Microbiology",value:13,count:4},{group:"topic",caption:"Materials Science",value:14,count:7},{group:"topic",caption:"Mathematics",value:15,count:3},{group:"topic",caption:"Medicine",value:16,count:52},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:3},{group:"topic",caption:"Physics",value:20,count:4},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Robotics",value:22,count:2},{group:"topic",caption:"Social Sciences",value:23,count:4},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:12,limit:12,total:222},popularBooks:{featuredBooks:[],offset:0,limit:12,total:null},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9154",title:"Spinal Deformities in Adolescents, Adults and Older Adults",subtitle:null,isOpenForSubmission:!1,hash:"313f1dffa803b60a14ff1e6966e93d91",slug:"spinal-deformities-in-adolescents-adults-and-older-adults",bookSignature:"Josette Bettany-Saltikov and Gokulakannan Kandasamy",coverURL:"https://cdn.intechopen.com/books/images_new/9154.jpg",editors:[{id:"94802",title:"Dr.",name:"Josette",middleName:null,surname:"Bettany-Saltikov",slug:"josette-bettany-saltikov",fullName:"Josette Bettany-Saltikov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7030",title:"Satellite Systems",subtitle:"Design, Modeling, Simulation and Analysis",isOpenForSubmission:!1,hash:"b9db6d2645ef248ceb1b33ea75f38e88",slug:"satellite-systems-design-modeling-simulation-and-analysis",bookSignature:"Tien Nguyen",coverURL:"https://cdn.intechopen.com/books/images_new/7030.jpg",editors:[{id:"210657",title:"Dr.",name:"Tien M.",middleName:"Manh",surname:"Nguyen",slug:"tien-m.-nguyen",fullName:"Tien M. Nguyen"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8472",title:"Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health",subtitle:null,isOpenForSubmission:!1,hash:"8855452919b8495810ef8e88641feb20",slug:"bioactive-compounds-in-nutraceutical-and-functional-food-for-good-human-health",bookSignature:"Kavita Sharma, Kanchan Mishra, Kula Kamal Senapati and Corina Danciu",coverURL:"https://cdn.intechopen.com/books/images_new/8472.jpg",editors:[{id:"197731",title:"Dr.",name:"Kavita",middleName:null,surname:"Sharma",slug:"kavita-sharma",fullName:"Kavita Sharma"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10201",title:"Post-Transition Metals",subtitle:null,isOpenForSubmission:!1,hash:"cc7f53ff5269916e3ce29f65a51a87ae",slug:"post-transition-metals",bookSignature:"Mohammed Muzibur Rahman, Abdullah Mohammed Asiri, Anish Khan, Inamuddin and Thamer Tabbakh",coverURL:"https://cdn.intechopen.com/books/images_new/10201.jpg",editors:[{id:"24438",title:"Prof.",name:"Mohammed Muzibur",middleName:null,surname:"Rahman",slug:"mohammed-muzibur-rahman",fullName:"Mohammed Muzibur Rahman"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10413",title:"A Collection of Papers on Chaos Theory and Its Applications",subtitle:null,isOpenForSubmission:!1,hash:"900b71b164948830fec3d6254b7881f7",slug:"a-collection-of-papers-on-chaos-theory-and-its-applications",bookSignature:"Paul Bracken and Dimo I. Uzunov",coverURL:"https://cdn.intechopen.com/books/images_new/10413.jpg",editors:[{id:"92883",title:"Prof.",name:"Paul",middleName:null,surname:"Bracken",slug:"paul-bracken",fullName:"Paul Bracken"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9515",title:"Update in Geriatrics",subtitle:null,isOpenForSubmission:!1,hash:"913e16c0ae977474b283bbd4269564c8",slug:"update-in-geriatrics",bookSignature:"Somchai Amornyotin",coverURL:"https://cdn.intechopen.com/books/images_new/9515.jpg",editors:[{id:"185484",title:"Prof.",name:"Somchai",middleName:null,surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8148",title:"Investment Strategies in Emerging New Trends in Finance",subtitle:null,isOpenForSubmission:!1,hash:"3b714d96a68d2acdfbd7b50aba6504ca",slug:"investment-strategies-in-emerging-new-trends-in-finance",bookSignature:"Reza Gharoie Ahangar and Asma Salman",coverURL:"https://cdn.intechopen.com/books/images_new/8148.jpg",editors:[{id:"91081",title:"Dr.",name:"Reza",middleName:null,surname:"Gharoie Ahangar",slug:"reza-gharoie-ahangar",fullName:"Reza Gharoie Ahangar"}],equalEditorOne:{id:"206443",title:"Prof.",name:"Asma",middleName:null,surname:"Salman",slug:"asma-salman",fullName:"Asma Salman",profilePictureURL:"https://mts.intechopen.com/storage/users/206443/images/system/206443.png",biography:"Professor Asma Salman is a blockchain developer and Professor of Finance at the American University in the Emirates, UAE. An Honorary Global Advisor at the Global Academy of Finance and Management, USA, she completed her MBA in Finance and Accounting and earned a Ph.D. in Finance from an AACSB member, AMBA accredited, School of Management at Harbin Institute of Technology, China. Her research credentials include a one-year residency at the Brunel Business School, Brunel University, UK. Prof. Salman also served as the Dubai Cohort supervisor for DBA students under the Nottingham Business School, UK, for seven years and is currently a Ph.D. supervisor at the University of Northampton, UK, where she is a visiting fellow. She also served on the Board of Etihad Airlines during 2019–2020. One of her recent articles on “Bitcoin and Blockchain” gained wide visibility and she is an active speaker on Fintech, blockchain, and crypto events around the GCC. She holds various professional certifications including Chartered Fintech Professional (USA), Certified Financial Manager (USA), Women in Leadership and Management in Higher Education, (UK), and Taxation GCC VAT Compliance, (UK). She recently won an award for “Blockchain Trainer of the Year” from Berkeley Middle East. Other recognitions include the Women Leadership Impact Award by H.E First Lady of Armenia, Research Excellence Award, and the Global Inspirational Women Leadership Award by H.H Sheikh Juma Bin Maktoum Juma Al Maktoum.",institutionString:"American University in the Emirates",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"American University in the Emirates",institutionURL:null,country:{name:"United Arab Emirates"}}},equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9559",title:"Teamwork in Healthcare",subtitle:null,isOpenForSubmission:!1,hash:"0053c2ff8d9ec4cc4aab82acea46a41e",slug:"teamwork-in-healthcare",bookSignature:"Michael S. Firstenberg and Stanislaw P. Stawicki",coverURL:"https://cdn.intechopen.com/books/images_new/9559.jpg",editedByType:"Edited by",editors:[{id:"64343",title:null,name:"Michael S.",middleName:null,surname:"Firstenberg",slug:"michael-s.-firstenberg",fullName:"Michael S. Firstenberg"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7016",title:"Cardiovascular Risk Factors in Pathology",subtitle:null,isOpenForSubmission:!1,hash:"7937d2c640c7515de372282c72ee5635",slug:"cardiovascular-risk-factors-in-pathology",bookSignature:"Alaeddin Abukabda, Maria Suciu and Minodora Andor",coverURL:"https://cdn.intechopen.com/books/images_new/7016.jpg",editedByType:"Edited by",editors:[{id:"307873",title:"Ph.D.",name:"Alaeddin",middleName:null,surname:"Abukabda",slug:"alaeddin-abukabda",fullName:"Alaeddin Abukabda"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9873",title:"Strategies of Sustainable Solid Waste Management",subtitle:null,isOpenForSubmission:!1,hash:"59b5ceeeedaf7449a30629923569388c",slug:"strategies-of-sustainable-solid-waste-management",bookSignature:"Hosam M. Saleh",coverURL:"https://cdn.intechopen.com/books/images_new/9873.jpg",editedByType:"Edited by",editors:[{id:"144691",title:"Prof.",name:"Hosam M.",middleName:"M.",surname:"Saleh",slug:"hosam-m.-saleh",fullName:"Hosam M. Saleh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9893",title:"Automation and Control",subtitle:null,isOpenForSubmission:!1,hash:"09ba24f6ac88af7f0aaff3029714ae48",slug:"automation-and-control",bookSignature:"Constantin Voloşencu, Serdar Küçük, José Guerrero and Oscar Valero",coverURL:"https://cdn.intechopen.com/books/images_new/9893.jpg",editedByType:"Edited by",editors:[{id:"1063",title:"Prof.",name:"Constantin",middleName:null,surname:"Volosencu",slug:"constantin-volosencu",fullName:"Constantin Volosencu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10405",title:"River Basin Management",subtitle:"Sustainability Issues and Planning Strategies",isOpenForSubmission:!1,hash:"5e5ddd0f2eda107ce19c4c06a55a8351",slug:"river-basin-management-sustainability-issues-and-planning-strategies",bookSignature:"José Simão Antunes Do Carmo",coverURL:"https://cdn.intechopen.com/books/images_new/10405.jpg",editedByType:"Edited by",editors:[{id:"67904",title:"Prof.",name:"José Simão",middleName:null,surname:"Antunes Do Carmo",slug:"jose-simao-antunes-do-carmo",fullName:"José Simão Antunes Do Carmo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9515",title:"Update in Geriatrics",subtitle:null,isOpenForSubmission:!1,hash:"913e16c0ae977474b283bbd4269564c8",slug:"update-in-geriatrics",bookSignature:"Somchai Amornyotin",coverURL:"https://cdn.intechopen.com/books/images_new/9515.jpg",editedByType:"Edited by",editors:[{id:"185484",title:"Prof.",name:"Somchai",middleName:null,surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9021",title:"Novel Perspectives of Stem Cell Manufacturing and Therapies",subtitle:null,isOpenForSubmission:!1,hash:"522c6db871783d2a11c17b83f1fd4e18",slug:"novel-perspectives-of-stem-cell-manufacturing-and-therapies",bookSignature:"Diana Kitala and Ana Colette Maurício",coverURL:"https://cdn.intechopen.com/books/images_new/9021.jpg",editedByType:"Edited by",editors:[{id:"203598",title:"Ph.D.",name:"Diana",middleName:null,surname:"Kitala",slug:"diana-kitala",fullName:"Diana Kitala"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7030",title:"Satellite Systems",subtitle:"Design, Modeling, Simulation and Analysis",isOpenForSubmission:!1,hash:"b9db6d2645ef248ceb1b33ea75f38e88",slug:"satellite-systems-design-modeling-simulation-and-analysis",bookSignature:"Tien Nguyen",coverURL:"https://cdn.intechopen.com/books/images_new/7030.jpg",editedByType:"Edited by",editors:[{id:"210657",title:"Dr.",name:"Tien M.",middleName:"Manh",surname:"Nguyen",slug:"tien-m.-nguyen",fullName:"Tien M. Nguyen"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10413",title:"A Collection of Papers on Chaos Theory and Its Applications",subtitle:null,isOpenForSubmission:!1,hash:"900b71b164948830fec3d6254b7881f7",slug:"a-collection-of-papers-on-chaos-theory-and-its-applications",bookSignature:"Paul Bracken and Dimo I. Uzunov",coverURL:"https://cdn.intechopen.com/books/images_new/10413.jpg",editedByType:"Edited by",editors:[{id:"92883",title:"Prof.",name:"Paul",middleName:null,surname:"Bracken",slug:"paul-bracken",fullName:"Paul Bracken"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9154",title:"Spinal Deformities in Adolescents, Adults and Older Adults",subtitle:null,isOpenForSubmission:!1,hash:"313f1dffa803b60a14ff1e6966e93d91",slug:"spinal-deformities-in-adolescents-adults-and-older-adults",bookSignature:"Josette Bettany-Saltikov and Gokulakannan Kandasamy",coverURL:"https://cdn.intechopen.com/books/images_new/9154.jpg",editedByType:"Edited by",editors:[{id:"94802",title:"Dr.",name:"Josette",middleName:null,surname:"Bettany-Saltikov",slug:"josette-bettany-saltikov",fullName:"Josette Bettany-Saltikov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"203",title:"Telemedicine",slug:"telemedicine",parent:{title:"Medicine",slug:"medicine"},numberOfBooks:6,numberOfAuthorsAndEditors:197,numberOfWosCitations:108,numberOfCrossrefCitations:94,numberOfDimensionsCitations:191,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"telemedicine",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"8332",title:"Telehealth",subtitle:null,isOpenForSubmission:!1,hash:"dd9601c901f7fe3803ae69dbd571feba",slug:"telehealth",bookSignature:"Thomas F. Heston",coverURL:"https://cdn.intechopen.com/books/images_new/8332.jpg",editedByType:"Edited by",editors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3269",title:"Telemedicine",subtitle:null,isOpenForSubmission:!1,hash:"16571516432b37129c1a7ef56c4cf3aa",slug:"telemedicine",bookSignature:"Ramesh Madhavan and Shahram Khalid",coverURL:"https://cdn.intechopen.com/books/images_new/3269.jpg",editedByType:"Edited by",editors:[{id:"158803",title:"Dr.",name:"Ramesh",middleName:null,surname:"Madhavan",slug:"ramesh-madhavan",fullName:"Ramesh Madhavan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2824",title:"eHealth and Remote Monitoring",subtitle:null,isOpenForSubmission:!1,hash:"fee1441d7fee8b6585fb3b4e43452da0",slug:"ehealth-and-remote-monitoring",bookSignature:"Amir Hajjam El Hassani",coverURL:"https://cdn.intechopen.com/books/images_new/2824.jpg",editedByType:"Edited by",editors:[{id:"17524",title:"Dr.",name:"Amir",middleName:null,surname:"Hajjam El Hassani",slug:"amir-hajjam-el-hassani",fullName:"Amir Hajjam El Hassani"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"199",title:"Telemedicine",subtitle:"Techniques and Applications",isOpenForSubmission:!1,hash:"0f4c17e1a24003fb78612525315af711",slug:"telemedicine-techniques-and-applications",bookSignature:"Georgi Graschew and Stefan Rakowsky",coverURL:"https://cdn.intechopen.com/books/images_new/199.jpg",editedByType:"Edited by",editors:[{id:"11262",title:"Dr.",name:"Georgi",middleName:null,surname:"Graschew",slug:"georgi-graschew",fullName:"Georgi Graschew"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1403",title:"Advances in Telemedicine",subtitle:"Applications in Various Medical Disciplines and Geographical Regions",isOpenForSubmission:!1,hash:"a8e4b1e59964db023e14fe11b26a232d",slug:"advances-in-telemedicine-applications-in-various-medical-disciplines-and-geographical-regions",bookSignature:"Georgi Graschew and Theo A. Roelofs",coverURL:"https://cdn.intechopen.com/books/images_new/1403.jpg",editedByType:"Edited by",editors:[{id:"11262",title:"Dr.",name:"Georgi",middleName:null,surname:"Graschew",slug:"georgi-graschew",fullName:"Georgi Graschew"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"43",title:"Advances in Telemedicine",subtitle:"Technologies, Enabling Factors and Scenarios",isOpenForSubmission:!1,hash:"45f56e0955035bdce490c5383a06792f",slug:"advances-in-telemedicine-technologies-enabling-factors-and-scenarios",bookSignature:"Georgi Graschew and Theo A. Roelofs",coverURL:"https://cdn.intechopen.com/books/images_new/43.jpg",editedByType:"Edited by",editors:[{id:"11262",title:"Dr.",name:"Georgi",middleName:null,surname:"Graschew",slug:"georgi-graschew",fullName:"Georgi Graschew"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:6,mostCitedChapters:[{id:"14328",doi:"10.5772/14352",title:"Telemedicine in Dentistry (Teledentistry)",slug:"telemedicine-in-dentistry-teledentistry-",totalDownloads:5306,totalCrossrefCites:9,totalDimensionsCites:17,book:{slug:"advances-in-telemedicine-applications-in-various-medical-disciplines-and-geographical-regions",title:"Advances in Telemedicine",fullTitle:"Advances in Telemedicine: Applications in Various Medical Disciplines and Geographical Regions"},signatures:"Branko Mihailovic, Milan Miladinovic and Biljana Vujicic",authors:[{id:"17551",title:"Dr.",name:"Milan",middleName:null,surname:"Miladinovic",slug:"milan-miladinovic",fullName:"Milan Miladinovic"},{id:"17555",title:"Dr.",name:"Branko",middleName:null,surname:"Mihailovic",slug:"branko-mihailovic",fullName:"Branko Mihailovic"},{id:"17556",title:"Dr.",name:"Biljana",middleName:null,surname:"Vujicic",slug:"biljana-vujicic",fullName:"Biljana Vujicic"}]},{id:"16882",doi:"10.5772/16362",title:"A 2.4GHz Non-Contact Biosensor System for Continuous Monitoring of Vital-Signs",slug:"a-2-4ghz-non-contact-biosensor-system-for-continuous-monitoring-of-vital-signs",totalDownloads:3916,totalCrossrefCites:8,totalDimensionsCites:13,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Donald Lie, Ravi Ichapurapu, Suyash Jain, Jerry Lopez, Ronald Banister, Tam Nguyen and John Griswold",authors:[{id:"24852",title:"Prof.",name:"Donald",middleName:null,surname:"Lie",slug:"donald-lie",fullName:"Donald Lie"},{id:"119104",title:"Dr.",name:"Ravi",middleName:null,surname:"Ichapurapu",slug:"ravi-ichapurapu",fullName:"Ravi Ichapurapu"},{id:"119105",title:"Dr.",name:"Suyash",middleName:null,surname:"Jain",slug:"suyash-jain",fullName:"Suyash Jain"},{id:"119106",title:"Dr.",name:"Jerry",middleName:null,surname:"Lopez",slug:"jerry-lopez",fullName:"Jerry Lopez"},{id:"119107",title:"Dr.",name:"Ronald",middleName:null,surname:"Banister",slug:"ronald-banister",fullName:"Ronald Banister"},{id:"119108",title:"Dr.",name:"Tam",middleName:null,surname:"Nguyen",slug:"tam-nguyen",fullName:"Tam Nguyen"},{id:"119109",title:"Dr.",name:"John",middleName:null,surname:"Griswold",slug:"john-griswold",fullName:"John Griswold"}]},{id:"45211",doi:"10.5772/56116",title:"The Telemedicine Service Maturity Model: A Framework for the Measurement and Improvement of Telemedicine Services",slug:"the-telemedicine-service-maturity-model-a-framework-for-the-measurement-and-improvement-of-telemedic",totalDownloads:2343,totalCrossrefCites:4,totalDimensionsCites:13,book:{slug:"telemedicine",title:"Telemedicine",fullTitle:"Telemedicine"},signatures:"Liezl van Dyk and Cornelius S.L. Schutte",authors:[{id:"27481",title:"Ms",name:"Liezl",middleName:null,surname:"Van Dyk",slug:"liezl-van-dyk",fullName:"Liezl Van Dyk"},{id:"166270",title:"Prof.",name:"Corne",middleName:null,surname:"Schutte",slug:"corne-schutte",fullName:"Corne Schutte"}]}],mostDownloadedChaptersLast30Days:[{id:"64650",title:"Barriers to Development of Telemedicine in Developing Countries",slug:"barriers-to-development-of-telemedicine-in-developing-countries",totalDownloads:1476,totalCrossrefCites:7,totalDimensionsCites:12,book:{slug:"telehealth",title:"Telehealth",fullTitle:"Telehealth"},signatures:"Surya Bali",authors:null},{id:"16894",title:"Practical Results of Telemedicine System Between Antarctic Station and Japan",slug:"practical-results-of-telemedicine-system-between-antarctic-station-and-japan",totalDownloads:1661,totalCrossrefCites:3,totalDimensionsCites:4,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Giichiro Ohno",authors:[{id:"31596",title:"Dr.",name:"Giichiro",middleName:null,surname:"Ohno",slug:"giichiro-ohno",fullName:"Giichiro Ohno"}]},{id:"38847",title:"Phonocardiogram Signal Processing Module for Auto-Diagnosis and Telemedicine Applications",slug:"phonocardiogram-signal-processing-module-for-auto-diagnosis-and-telemedicine-applications",totalDownloads:2538,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"ehealth-and-remote-monitoring",title:"eHealth and Remote Monitoring",fullTitle:"eHealth and Remote Monitoring"},signatures:"Ali Moukadem, Alain Dieterlen and Christian Brandt",authors:[{id:"144059",title:"Dr.",name:"Ali",middleName:null,surname:"Moukadem",slug:"ali-moukadem",fullName:"Ali Moukadem"},{id:"144067",title:"Prof.",name:"Alain",middleName:null,surname:"Dieterlen",slug:"alain-dieterlen",fullName:"Alain Dieterlen"},{id:"144068",title:"Dr.",name:"Christian",middleName:null,surname:"Brandt",slug:"christian-brandt",fullName:"Christian Brandt"}]},{id:"16876",title:"Wireless Telemedicine System: An Accurate, Reliable and Secure Real-time Health Care",slug:"wireless-telemedicine-system-an-accurate-reliable-and-secure-real-time-health-care",totalDownloads:2781,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Huyu Qu, Le Yi Wang, Christopher M. Klaus, Qiang Cheng, Ece Yaprak and Hong Wang",authors:[{id:"43140",title:"Dr",name:"Huyu",middleName:null,surname:"Qu",slug:"huyu-qu",fullName:"Huyu Qu"},{id:"81129",title:"Prof.",name:"Le Yi",middleName:null,surname:"Wang",slug:"le-yi-wang",fullName:"Le Yi Wang"},{id:"81133",title:"Mr.",name:"Christopher",middleName:null,surname:"Klaus",slug:"christopher-klaus",fullName:"Christopher Klaus"},{id:"81136",title:"Prof.",name:"Qiang",middleName:null,surname:"Cheng",slug:"qiang-cheng",fullName:"Qiang Cheng"},{id:"81138",title:"Prof.",name:"Ece",middleName:null,surname:"Yaprak",slug:"ece-yaprak",fullName:"Ece Yaprak"},{id:"81141",title:"Dr.",name:"Hong",middleName:null,surname:"Wang",slug:"hong-wang",fullName:"Hong Wang"}]},{id:"16878",title:"QoS in Telemedicine",slug:"qos-in-telemedicine",totalDownloads:3241,totalCrossrefCites:4,totalDimensionsCites:7,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Phumzile Malindi",authors:[{id:"38001",title:"Dr.",name:"Phumzile",middleName:null,surname:"Malindi",slug:"phumzile-malindi",fullName:"Phumzile Malindi"}]},{id:"16881",title:"Clinical Decision Support Systems",slug:"clinical-decision-support-systems",totalDownloads:9292,totalCrossrefCites:4,totalDimensionsCites:9,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Dejan Dinevski, Uroš Bele, Tomislav Šarenac, Uroš Rajkovič and Olga Šušteršic",authors:[{id:"15129",title:"Prof.",name:"Dejan",middleName:null,surname:"Dinevski",slug:"dejan-dinevski",fullName:"Dejan Dinevski"},{id:"63337",title:"Dr.",name:"Uroš",middleName:null,surname:"Bele",slug:"uros-bele",fullName:"Uroš Bele"},{id:"63338",title:"MSc",name:"Tomislav",middleName:null,surname:"Sarenac",slug:"tomislav-sarenac",fullName:"Tomislav Sarenac"},{id:"63339",title:"Dr.",name:"Uroš",middleName:null,surname:"Rajkovi?",slug:"uros-rajkovi",fullName:"Uroš Rajkovi?"},{id:"63340",title:"Dr.",name:"Olga",middleName:null,surname:"Šušterši?",slug:"olga-sustersi",fullName:"Olga Šušterši?"}]},{id:"64775",title:"Introductory Chapter: Telemedicine",slug:"introductory-chapter-telemedicine",totalDownloads:585,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"telehealth",title:"Telehealth",fullTitle:"Telehealth"},signatures:"Thomas F. Heston",authors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}]},{id:"65236",title:"An Analysis of Telemedicine Experiences and Services in Chile",slug:"an-analysis-of-telemedicine-experiences-and-services-in-chile",totalDownloads:734,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"telehealth",title:"Telehealth",fullTitle:"Telehealth"},signatures:"Antonio Rienzo Renato",authors:null},{id:"14331",title:"Avera eCARE®, a Comprehensive Telemedicine Program for the Rural North Central Region of the United States",slug:"avera-ecare-a-comprehensive-telemedicine-program-for-the-rural-north-central-region-of-the-united-st",totalDownloads:2272,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"advances-in-telemedicine-applications-in-various-medical-disciplines-and-geographical-regions",title:"Advances in Telemedicine",fullTitle:"Advances in Telemedicine: Applications in Various Medical Disciplines and Geographical Regions"},signatures:"Edward T. Zawada Jr., David Kapaska, Pat Herr and Michael Heisler",authors:[{id:"16344",title:"Dr.",name:"Edward T.",middleName:null,surname:"Zawada Jr.",slug:"edward-t.-zawada-jr.",fullName:"Edward T. Zawada Jr."},{id:"41130",title:"Dr.",name:"David",middleName:null,surname:"Kapaska",slug:"david-kapaska",fullName:"David Kapaska"},{id:"41131",title:"Ms.",name:"Pat",middleName:null,surname:"Herr",slug:"pat-herr",fullName:"Pat Herr"},{id:"41132",title:"Dr.",name:"Michael",middleName:null,surname:"Heisler",slug:"michael-heisler",fullName:"Michael Heisler"}]},{id:"16875",title:"Pervasive Homecare Monitoring Technologies and Applications",slug:"pervasive-homecare-monitoring-technologies-and-applications",totalDownloads:3389,totalCrossrefCites:1,totalDimensionsCites:2,book:{slug:"telemedicine-techniques-and-applications",title:"Telemedicine",fullTitle:"Telemedicine Techniques and Applications"},signatures:"Demosthenes Vouyioukas and Alexandros Karagiannis",authors:[{id:"40966",title:"MSc",name:"Alexandros",middleName:null,surname:"Karagiannis",slug:"alexandros-karagiannis",fullName:"Alexandros Karagiannis"},{id:"43110",title:"Prof.",name:"Demosthenes",middleName:null,surname:"Vouyioukas",slug:"demosthenes-vouyioukas",fullName:"Demosthenes Vouyioukas"}]}],onlineFirstChaptersFilter:{topicSlug:"telemedicine",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:0,limit:8,total:null},route:{name:"profile.detail",path:"/profiles/312476/seham-alyafei",hash:"",query:{},params:{id:"312476",slug:"seham-alyafei"},fullPath:"/profiles/312476/seham-alyafei",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()