|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996464543103316 |
|
|
Autore |
Rayes Ammar |
|
|
Titolo |
Internet of things from hype to reality : the road to digitization / / Ammar Rayes and Samer Salam |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[3rd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (471 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet of things |
Internet of things - Equipment and supplies |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Foreword I -- Foreword II -- Preface -- Acknowledgments -- Disclaimer -- Contents -- About the Authors -- Chapter 1: Internet of Things (IoT) Overview -- 1.1 What Is the Internet of Things (IoT)? -- 1.1.1 Background and More Complete IoT Definition -- 1.1.2 How to Monitor and Control Things from Anywhere in the World? -- 1.1.3 Why Do We Want to Monitor and Control Things? -- 1.1.4 Who Will Monitor and Control? -- 1.1.5 How Is Security Guaranteed? -- 1.2 IoT Reference Framework -- 1.3 Why Now? The 12 Factors for a Perfect Storm -- 1.3.1 Convergence of IT and OT -- 1.3.2 The Astonishing Introduction of Creative Internet-Based Businesses -- 1.3.2.1 Uber -- 1.3.2.2 Airbnb -- 1.3.2.3 Square -- 1.3.2.4 Amazon -- 1.3.2.5 Tesla -- 1.3.2.6 Self-Driving Cars -- 1.3.3 Mobile Device Explosion -- 1.3.4 Social Network Explosion -- 1.3.5 Analytics at the Edge -- 1.3.6 Cloud Computing and Virtualization -- 1.3.7 Technology Explosion -- 1.3.8 Digital Convergence/Transformation -- 1.3.9 Enhanced User Interfaces -- 1.3.10 Fast Rate of IoT Technology Adoption (Five Times More than Electricity and Telephony) -- 1.3.11 The Rise of Security Requirements -- 1.3.12 The Nonstop Moore's Law -- 1.4 History of the Internet -- 1.5 Summary -- References -- Chapter 2: The Internet in IoT -- 2.1 The Open System Interconnection Model -- 2.2 End-to-End View of the OSI Model -- 2.3 Transmission Control Protocol/Internet Protocol (TCP/IP) -- 2.3.1 TCP/IP Layer 4: Application Layer -- 2.3.2 |
|
|
|
|
|
|
|
|
|
TCP/IP Layer 3: Transport Layer -- 2.3.3 TCP/IP Layer 2: Internet Layer -- 2.3.3.1 Router Main Components -- 2.3.4 TCP/IP Layer 1: Network Access Layer -- 2.4 IoT Network Level: Key Performance Characteristics -- 2.4.1 End-to-End Delay -- 2.4.2 Packet Loss -- 2.4.3 Throughput -- 2.5 Internet Protocol Suite -- 2.5.1 IoT Network Level: Addressing -- 2.5.1.1 IP Version 4 -- IPv4 Subnet Mask. |
IPv4 Classes -- 2.5.1.2 IP Version 6 -- 2.5.2 IPv6 Address Notation -- 2.5.3 IoT Network Level: Routing -- 2.5.3.1 Interior Routing Protocols -- 2.5.3.2 Exterior Routing Protocols -- 2.6 Summary -- References -- Chapter 3: The Things in IoT: Sensors and Actuators -- 3.1 Introduction -- 3.2 IoT Sensors -- 3.2.1 Definition -- 3.2.2 Why Sensors -- 3.2.3 Sensor Types -- 3.2.4 Sensor Characteristics -- 3.3 RFID -- 3.3.1 RFID Main Usage and Applications -- 3.4 Video Tracking -- 3.4.1 Video Tracking Applications -- 3.4.2 Video Tracking Algorithms -- 3.5 IoT Actuators -- 3.5.1 Definition -- 3.5.2 Why Actuators? -- 3.5.3 Actuator Types -- 3.5.4 Controlling IoT Devices -- 3.6 How Things Are Identified in IoT? -- 3.7 Summary -- References -- Chapter 4: IoT Requirements for Networking Protocols -- 4.1 Support for Constrained Devices -- 4.2 Massive Scalability -- 4.2.1 Device Addressing -- 4.2.2 Credentials Management -- 4.2.3 Control Plane -- 4.2.4 Wireless Spectrum -- 4.3 Determinism -- 4.4 Security and Privacy -- 4.5 Application Interoperability -- 4.5.1 Abstractions and Standard APIs -- 4.5.2 Semantic Interoperability -- 4.6 Summary -- References -- Chapter 5: IoT Protocol Stack: A Layered View -- 5.1 Link Layer -- 5.1.1 Challenges -- 5.1.2 Industry Progress -- 5.1.2.1 IEEE 802.15.4 -- 5.1.2.2 IEEE 802.15.4e TSCH -- 5.1.2.3 LPWAN -- LoRaWAN -- Network Architecture -- Device Class Capabilities -- Scalability -- Energy Efficiency -- Security -- Regional Variations -- Challenges -- NB-IoT -- Network Architecture -- Device Categories -- Scalability -- Energy Efficiency -- Security -- Comparison of LoRaWAN and NB-IoT -- 5.1.2.4 IEEE 802.11ah -- Short MAC Header -- Large Number of Stations -- Speeding Frame Exchanges -- Relay -- Target Wake Time -- Grouping -- Traffic Indication Map (TIM) and Paging Mechanism -- Restricted Access Windows. |
5.1.2.5 Comparison of Wireless Link Layer Protocols -- 5.1.2.6 Time-Sensitive Networking -- IEEE 802.1Qca -- IEEE 802.1Qbv -- IEEE 802.1CB -- 5.2 Internet Layer -- 5.2.1 Challenges -- 5.2.2 Industry Progress -- 5.2.2.1 6LowPAN -- 5.2.2.2 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks -- 5.2.2.3 6TiSCH -- Network Formation -- Network Maintenance -- Topology and Schedule Mapping -- Resource Management -- Flow Control -- Determinism -- Scheduling Mechanisms -- Secure Communication -- 5.3 Application Protocols Layer -- 5.3.1 Data Serialization Formats -- 5.3.2 Communication Paradigms -- 5.3.2.1 Request/Response Versus Publish/Subscribe -- 5.3.2.2 Blocking Versus Non-blocking -- 5.3.3 QoS -- 5.3.3.1 Resource Utilization -- Resource Limits Policy -- Time Filter Policy -- 5.3.3.2 Data Timeliness -- Deadline Policy -- Latency Budget Policy -- 5.3.3.3 Data Availability -- Durability Policy -- Life Span Policy -- History Policy -- 5.3.3.4 Data Delivery -- Reliability Policy -- Transport Priority -- 5.3.4 RESTful Constraints -- 5.3.5 Survey of IoT Application Protocols -- 5.3.5.1 CoAP -- 5.3.5.2 XMPP -- 5.3.5.3 MQTT -- 5.3.5.4 AMQP -- 5.3.5.5 SIP -- 5.3.5.6 IEEE 1888 -- 5.3.5.7 DDS RTPS -- 5.4 Application Services Layer -- 5.4.1 Motivation -- 5.4.2 Industry Progress -- 5.4.2.1 ETSI M2M -- 5.4.2.2 oneM2M -- 5.4.3 Technology Gaps -- 5.5 Summary -- References -- Chapter 6: Fog Computing -- 6.1 Defining Fog Computing -- 6.2 Drivers for Fog -- 6.2.1 Data Deluge -- 6.2.2 Rapid Mobility -- 6.2.3 Reliable Control -- 6.2.4 Data Management and Analytics -- 6.3 Characteristics of Fog -- 6.4 |
|
|
|
|
|
|
|
Enabling Technologies and Prerequisites -- 6.4.1 Virtualization Technologies -- 6.4.1.1 Containers and Virtual Machines -- 6.4.1.2 Docker -- 6.4.1.3 Application Mobility -- 6.4.2 Network Support for Mobility -- 6.4.2.1 EVPN. |
Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.2.2 LISP -- Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.3 Fog Orchestration -- 6.4.3.1 Topology -- 6.4.3.2 Things Connectivity -- 6.4.3.3 Network Performance Guarantees -- 6.4.4 Data Management -- 6.4.4.1 Data in Motion -- 6.4.4.2 Search Technologies and Engines -- 6.4.5 More Gaps Ahead -- 6.5 Summary -- References -- Chapter 7: IoT Services Platform: Functions and Requirements -- 7.1 IoT Services Platform Functions -- 7.2 IoT Platform Manager -- 7.3 Discovery: Entities, Services, and Location -- 7.3.1 Registration -- 7.3.2 Discovery -- 7.4 Communication Manager -- 7.5 Data Management and Repository -- 7.6 Element Manager (Managing IoT Devices and Network Elements) -- 7.6.1 Configuration (and Provisioning) Management -- 7.6.2 Fault Management -- 7.6.3 Performance Management -- 7.6.4 Important Performance Measures for IoT Devices (E.g., Sensors) -- 7.6.5 Security Management -- 7.7 Firmware Manager -- 7.8 Topology Manager -- 7.9 Group Manager -- 7.10 Billing and Accounting -- 7.11 Subscription and Notification Manager -- 7.12 API Manager -- 7.13 Commercially Available IoT Platforms -- 7.14 Putting All Together -- 7.15 Summary -- References -- Chapter 8: Internet of Things Security and Privacy -- 8.1 Introduction -- 8.2 IoT Security Challenges -- 8.3 IoT Security Requirements -- 8.4 IoT Three-Domain Architecture -- 8.5 Cloud Domain Attacks and Countermeasures -- 8.6 Fog Domain Attacks and Countermeasures -- 8.7 Sensing Domain Attacks and Countermeasures -- 8.8 Securing IoT Devices -- 8.8.1 IoT Devices Gone Rogue -- 8.8.1.1 Botnets -- 8.8.1.2 Webcams -- 8.8.1.3 Casino Fish Tank -- 8.8.1.4 Cardiac Devices -- 8.8.1.5 Vehicles -- 8.8.2 MUD -- 8.8.3 DICE -- 8.9 Summary and Future Directions -- References. |
Chapter 9: IoT Vertical Markets and Connected Ecosystems -- 9.1 IoT Verticals -- 9.1.1 IoT Agriculture and Farming -- 9.1.2 IoT Energy Solutions -- 9.1.3 IoT Oil and Gas Solutions -- 9.1.3.1 Oil and Gas Exercise -- 9.1.4 IoT Smart Building Solutions -- 9.1.5 IoT Finance -- 9.1.6 IoT Healthcare -- 9.1.7 IoT Industrial -- 9.1.8 IoT Retail -- 9.1.9 IoT Transportation -- 9.2 IoT Service Model: Anything as a Service -- 9.2.1 Thrust as a Service -- 9.2.2 Imaging as a Service -- 9.2.3 Farming as a Service -- 9.2.4 IT as a Service -- 9.3 Enabling "Anything as a Service" -- 9.3.1 Example: IoT IT Services -- 9.4 Connected Ecosystems -- 9.4.1 IoT Services Terminologies -- 9.4.2 IoT Connected Ecosystems Models -- 9.4.3 IoT Connected Ecosystems Models Key Capabilities -- 9.5 Summary -- References -- Chapter 10: The Blockchain in IoT -- 10.1 Introduction -- 10.2 What Is the Blockchain? -- 10.2.1 Bitcoin and Blockchain -- 10.2.2 Evolution of Blockchain -- 10.2.3 Defining Blockchain -- 10.3 How Blockchains Work -- 10.3.1 Anatomy of the Blockchain -- 10.3.2 Understanding a Block's Hash -- 10.3.3 Lifecycle of a Transaction -- 10.4 Features of Blockchain -- 10.4.1 Consensus Algorithms in IoT -- 10.4.2 Cryptography -- 10.4.3 Decentralized -- 10.4.4 Transparency and Trust -- 10.4.5 Permissioned, Permissionless, and Consortium -- 10.4.6 Smart Contracts -- 10.4.7 Advantages and Disadvantages -- 10.5 Blockchain Applications in IoT -- 10.5.1 M2M Transactions -- 10.5.2 Energy Management -- 10.5.3 Supply Chain Management -- 10.5.4 Healthcare -- 10.5.5 Retail -- 10.5.6 Automotive and Transportation -- 10.5.7 Smart City -- 10.5.8 Identity, Authentication, and Access Management |
|
|
|
|
|
|
|
|
-- 10.5.9 Other Blockchain IoT Applications -- 10.6 Blockchain Security in IoT -- 10.6.1 Trust Between Nodes -- 10.6.2 Malicious Activity and Cryptographic Principles. |
10.6.3 IoT Security and Blockchain Advantages. |
|
|
|
|
|
| |