UID:
almahu_9948026705302882
Format:
1 online resource (392 pages) :
,
color illustrations
Edition:
Second edition.
ISBN:
0-12-814436-X
Note:
Front Cover -- Internet of Things -- Copyright -- Contents -- About the Authors -- Foreword to the First Edition by Zach Shelby -- Foreword to the First Edition by Geoff Mulligan -- Foreword to the Second Edition by Geoff Mulligan -- Preface -- Introduction -- Structure of the Book -- Part 1: The Evolving IoT Landscape -- Chapter 1: Why the Internet of Things? -- Chapter 2: Origins and IoT Landscape -- Chapter 3: IoT - A Business Perspective -- Chapter 4: An Architecture Perspective -- Part 2: IoT Technologies and Architectures -- Chapter 5: Technology Fundamentals -- Chapter 6: Security -- Chapter 7: Architecture and State-of-the-Art -- Chapter 8: Architecture Reference Model -- Chapter 9: Designing the Internet of Things for the Real-World -- Part 3: IoT Use Cases -- Chapter 10: Asset Management -- Chapter 11: Industrial Automation -- Chapter 12: Smart Grid -- Chapter 13: Commercial Building Automation -- Chapter 14: Smart Cities -- Chapter 15: Participatory Sensing -- Chapter 16: Autonomous Vehicles and Systems of Cyber-Physical Systems -- Chapter 17: Logistics -- Chapter 18: Conclusions and Looking Ahead -- Appendix A: ETSI M2M -- Acknowledgments -- Part 1 The Evolving IoT Landscape -- 1 Why the Internet of Things? -- 2 Origins and IoT Landscape -- 2.1 Introduction -- 2.2 Evolving to an Internet of Things -- 2.2.1 A brief background -- 2.2.2 A simple enterprise IoT solution overview -- 2.2.3 The Internet of Things ahead -- 2.3 IoT in a Global Context -- 2.3.1 Game changers -- 2.3.2 General technology and scienti c trends -- 2.3.3 Trends in information and communications technologies -- 2.3.4 Expected capabilities -- 2.3.5 Implications for IoT -- 2.3.6 Barriers and concerns -- 2.4 A Use Case Example -- 2.5 A Shift in Mindset -- 3 IoT - A Business Perspective -- 3.1 Introduction -- 3.1.1 Information marketplaces -- 3.2 De nitions.
,
3.2.1 Global value chains -- 3.2.2 Ecosystems vs. value chains -- 3.2.3 Industrial structure -- 3.3 Value Chains Overview -- 3.4 IoT Value Chain Example -- 3.5 An Emerging Industrial Structure for IoT -- 3.5.1 The Information-Driven Global Value Chain -- 3.5.1.1 Inputs to the information-driven global commodity chain -- 3.5.1.2 Production processes of the information-driven global value chain -- 3.6 The International-Driven Global Value Chain and Global Information Monopolies -- 3.7 Business Model Innovation in IoT -- 3.7.1 Current examples -- 3.7.2 Business to Business models -- 3.7.3 Data analytics business models -- 3.7.4 New data marketplaces models -- 3.7.5 SLA security integration -- 3.8 Conclusions -- 4 An Architecture Perspective -- 4.1 Building an Architecture -- 4.2 Requirements and Main Design Principles -- 4.3 An IoT Architecture Outline -- 4.4 Standards Considerations -- Part 2 IoT Technologies and Architectures -- 5 Technology Fundamentals -- 5.1 Devices and Gateways -- 5.1.1 Introduction -- 5.1.1.1 Device types -- 5.1.1.2 Deployment scenarios for devices -- 5.1.2 Basic devices -- 5.1.3 Gateways -- 5.1.3.1 Data Management -- 5.1.3.2 Local applications -- 5.1.3.3 Device Management -- 5.1.4 Advanced devices -- 5.1.5 Summary and vision -- 5.2 Local and Wide Area Networking -- 5.2.1 The need for networking -- 5.2.2 Wide Area Networking -- 5.2.2.1 3rd Generation Partnership Project technologies and Machine Type Communications -- 5.2.3 Low-Power Wide Area Networks -- 5.2.3.1 3GPP Licensed Spectrum LPWA Technologies -- 5.2.3.2 Proprietary LPWA technologies -- 5.2.3.3 LPWA standards landscape -- 5.2.4 Local Area Networking -- 5.2.4.1 Deployment considerations -- 5.2.4.2 Key technologies -- 5.3 Machine Intelligence -- 5.3.1 The role of Machine Intelligence in IoT -- 5.3.2 Machine Intelligence overview.
,
5.3.3 Considerations when using MI for IoT data -- 5.3.4 A framework of MI for IoT -- 5.3.5 Industrial Internet Analytics Framework -- 5.3.6 Conclusions -- 5.4 Distributed Cloud and Edge Computing -- 5.4.1 A new software delivery model -- 5.4.2 Cloud fundamentals -- 5.4.3 Computing at the edge -- 5.4.4 Considerations and conclusions -- 5.5 Data Management -- 5.5.1 Introduction -- 5.5.2 Managing IoT data ow -- 5.5.2.1 Data generation -- 5.5.2.2 Data acquisition -- 5.5.2.3 Data validation -- 5.5.2.4 Data storage -- 5.5.2.5 Data processing -- 5.5.2.6 Data remanence -- 5.5.2.7 Data analysis -- 5.5.3 IoT data considerations -- 5.5.4 Conclusions -- 5.6 Business Processes in IoT -- 5.6.1 Introduction -- 5.6.2 IoT integration with enterprise systems -- 5.6.3 Distributed business processes in IoT -- 5.6.4 Considerations -- 5.6.5 Conclusions -- 5.7 Distributed Ledgers and Applications -- 5.7.1 DLT, IoT, and Data Ownership -- 6 Security -- 6.1 Introduction -- 6.2 Basic Principles -- 6.2.1 Encryption -- 6.2.1.1 Ciphers -- 6.2.1.2 Symmetric ciphers -- 6.2.1.3 Asymmetric ciphers -- 6.2.2 Authentication -- 6.2.2.1 Symmetric authentication -- 6.2.2.2 Asymmetric authentication -- 6.2.2.3 Application of authentication -- 6.3 Threats to IoT Systems -- 6.3.1 Denial of Service (DoS) Attacks -- 6.3.2 Sybil attacks -- 6.3.3 Privacy attacks -- 6.3.4 "Hole" attacks -- 6.3.5 Physical attacks -- 6.4 Mitigating Threats to IoT Applications -- 6.4.1 Application layer and physical attacks -- 6.4.2 Transport layer -- 6.4.3 Network layer -- 6.4.4 Data Link/Medium Access Control layer -- 6.4.5 Physical layer -- 6.5 Security in Architectures and Standards -- 6.5.1 IETF -- 6.5.2 3GPP and low-power Wide Area Networks -- 6.6 Security for a Safe IoT -- 6.6.1 Safety in industrial automation and robotics -- 6.6.2 Safety in automotive systems -- 6.6.3 Safety in Smart Cities.
,
6.7 Privacy in IoT -- 6.8 Future Developments in Security -- 7 Architecture and State-of-the-Art -- 7.1 Introduction -- 7.2 ITU-T -- 7.3 IETF -- 7.3.1 Introduction -- 7.3.2 IETF IoT-related Working Groups -- 7.3.3 IETF fragments of an architecture -- 7.4 OMA -- 7.5 IoT-A and IIRA -- 7.6 RAMI 4.0 -- 7.7 W3C -- 7.8 OGC -- 7.9 GS1 Architecture and Technologies -- 7.9.1 GS1 Identify -- 7.9.2 GS1 Capture -- 7.9.3 GS1 Share -- 7.9.4 EPCIS architecture and technologies -- 7.10 Other Relevant State-of-the-Art -- 7.10.1 oneM2M -- 7.10.2 OCF -- 7.10.3 IEEE -- 7.10.4 IEC/ISO: ISO/IEC JTC 1/WG 10/SC 41 -- 7.10.5 AIOTI -- 7.10.6 NIST CPS -- 7.11 Conclusions -- 8 Architecture Reference Model -- 8.1 Introduction -- 8.2 Reference Model and Architecture -- 8.3 IoT Reference Model -- 8.3.1 IoT Domain Model -- 8.3.1.1 Model notation and semantics -- 8.3.1.2 Main concepts -- 8.3.1.3 Further considerations -- 8.3.2 Information model -- 8.3.3 Functional model -- 8.3.3.1 Device Functional Group -- 8.3.3.2 Communication Functional Group -- 8.3.3.3 IoT Service Functional Group -- 8.3.3.4 Virtual Entity Functional Group -- 8.3.3.5 IoT Service Organization Functional Group -- 8.3.3.6 IoT Process Management Functional Group -- 8.3.3.7 Management Functional Group -- 8.3.3.8 Security Functional Group -- 8.3.3.9 Application Functional Group -- 8.3.3.10 Modular IoT functions -- 8.3.4 Communication model -- 8.3.5 Safety, privacy, trust, security model -- 8.3.5.1 Safety -- 8.3.5.2 Privacy -- 8.3.5.3 Trust -- 8.3.5.4 Security -- 8.4 IoT Reference Architecture -- 8.5 Functional View -- 8.5.1 Device and Application Functional Group -- 8.5.2 Communication Functional Group -- 8.5.3 IoT Service Functional Group -- 8.5.4 Virtual Entity Functional Group -- 8.5.5 IoT Process Management Functional Group -- 8.5.6 Service Organization Functional Group -- 8.5.7 Security Functional Group.
,
8.5.8 Management Functional Group -- 8.6 Information View -- 8.6.1 Information description -- 8.6.2 Information ow and lifecycle -- 8.6.3 Information handling -- 8.7 Deployment and Operational View -- 8.8 Other Relevant Architectural Views -- 8.9 Other Reference Models and Architectures -- 8.9.1 Industrial Internet Reference Architecture -- 8.9.1.1 IIRA Usage Viewpoint -- 8.9.1.2 IIRA Functional Viewpoint -- 8.9.1.3 IIRA Implementation viewpoint -- 8.10 Best Practices -- 8.11 Conclusions -- 9 Designing the Internet of Things for the Real World -- 9.1 Introduction -- 9.2 Technical Design Constraints - Hardware Is Popular Again -- 9.2.1 Devices and networks -- 9.2.1.1 Functional requirements -- 9.2.1.2 Sensing and communications eld -- 9.2.1.3 Programming and embedded intelligence -- 9.2.1.4 Power -- 9.2.1.5 Gateway -- 9.2.1.6 Nonfunctional requirements -- 9.2.1.7 Financial cost -- 9.3 Data Representation and Visualization -- 9.4 Interaction and Remote Control -- Part 3 IoT Use Cases -- 10 Asset Management -- 10.1 Introduction -- 10.2 Expected Bene ts -- 10.3 e-Maintenance in the IoT Era -- 10.4 Hazardous Goods Management in the IoT Era -- 10.5 Conclusions -- 11 Industrial Automation -- 11.1 SOA-Based Device Integration -- 11.2 SOCRADES: Realizing the Enterprise Integrated Web of Things -- 11.3 IMC-AESOP: From the Web of Things to the Cloud of Things -- 11.4 Conclusions -- 12 Smart Grid -- 12.1 Introduction -- 12.2 Smart Metering -- 12.3 Smart House -- 12.4 Smart Grid City -- 12.5 Conclusions -- 13 Commercial Building Automation -- 13.1 Introduction -- 13.2 Case Study: Phase One - Commercial Building Automation Today -- 13.2.1 Background -- 13.2.2 Technology overview -- 13.2.3 Value chain -- 13.3 Case Study: Phase Two - Commercial Building Automation in the Future -- 13.3.1 Evolution of commercial building automation -- 13.3.2 Background.
,
13.3.3 Technology overview.
Additional Edition:
ISBN 0-12-814435-1
Language:
English
Bookmarklink