top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 2021 international conference on smart technologies and systems for internet of things : STSIoT 2021 / / Ishfaq Ahmad, Jun Ye, and Weidong Liu, editors
The 2021 international conference on smart technologies and systems for internet of things : STSIoT 2021 / / Ishfaq Ahmad, Jun Ye, and Weidong Liu, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (818 pages)
Disciplina 004.678
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 981-19-3632-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Two thousand twenty-one international conference on smart technologies and systems for internet of things
Record Nr. UNINA-9910627260303321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Battery-less NFC sensors for the internet of things / / Martí Boada [and three others]
Battery-less NFC sensors for the internet of things / / Martí Boada [and three others]
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022]
Descrizione fisica 1 online resource (185 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 1-394-17361-X
1-394-17360-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Title Page -- Copyright -- Introduction -- Chapter 1. Wireless Power Transfer Applied to NFC -- 1.1. Introduction -- 1.2. Theoretical background -- 1.3. NFC systems -- 1.4. NFC constraints -- 1.5. NFC simulation and measurement -- Chapter 2. Case Study 1: Soil Moisture Sensor -- 2.1. Motivation -- 2.2. Soil moisture measurement techniques -- 2.3. System description -- 2.4. Experimental results -- Chapter 3. Case Study 2: Smart Diaper -- 3.1. Motivation -- 3.2. Capacitive moisture detection -- 3.3. Capacitance simulation -- 3.4. Experimental results -- 3.5. Comparison with other technologies -- Chapter 4. Case Study 3: NFC Sensor for pH Monitoring -- 4.1. Motivation -- 4.2. System description -- 4.3. Signal processing -- 4.4. Experimental results -- 4.5. App and cloud storage -- Chapter 5. Case Study 4: Fruit Ripeness Sensor -- 5.1. Motivation -- 5.2. System overview -- 5.3. Experimental results -- 5.4. Mobile app -- List of Acronyms -- References -- Index.
Record Nr. UNINA-9910642817603321
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Autore Wang Bo <1967->
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (299 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 981-16-9194-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464551003316
Wang Bo <1967->  
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Autore Wang Bo <1967->
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (299 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 981-16-9193-2
981-16-9194-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996549370203316
Wang Bo <1967->  
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Internet of things and BDS application / / Bo Wang, Xiangsheng Liu and Yaqi Zhang
Autore Wang Bo <1967->
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (299 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 981-16-9193-2
981-16-9194-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743350703321
Wang Bo <1967->  
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of things from hype to reality : the road to digitization / / Ammar Rayes and Samer Salam
Internet of things from hype to reality : the road to digitization / / Ammar Rayes and Samer Salam
Autore Rayes Ammar
Edizione [3rd ed.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (471 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 3-030-90158-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword I -- Foreword II -- Preface -- Acknowledgments -- Disclaimer -- Contents -- About the Authors -- Chapter 1: Internet of Things (IoT) Overview -- 1.1 What Is the Internet of Things (IoT)? -- 1.1.1 Background and More Complete IoT Definition -- 1.1.2 How to Monitor and Control Things from Anywhere in the World? -- 1.1.3 Why Do We Want to Monitor and Control Things? -- 1.1.4 Who Will Monitor and Control? -- 1.1.5 How Is Security Guaranteed? -- 1.2 IoT Reference Framework -- 1.3 Why Now? The 12 Factors for a Perfect Storm -- 1.3.1 Convergence of IT and OT -- 1.3.2 The Astonishing Introduction of Creative Internet-Based Businesses -- 1.3.2.1 Uber -- 1.3.2.2 Airbnb -- 1.3.2.3 Square -- 1.3.2.4 Amazon -- 1.3.2.5 Tesla -- 1.3.2.6 Self-Driving Cars -- 1.3.3 Mobile Device Explosion -- 1.3.4 Social Network Explosion -- 1.3.5 Analytics at the Edge -- 1.3.6 Cloud Computing and Virtualization -- 1.3.7 Technology Explosion -- 1.3.8 Digital Convergence/Transformation -- 1.3.9 Enhanced User Interfaces -- 1.3.10 Fast Rate of IoT Technology Adoption (Five Times More than Electricity and Telephony) -- 1.3.11 The Rise of Security Requirements -- 1.3.12 The Nonstop Moore's Law -- 1.4 History of the Internet -- 1.5 Summary -- References -- Chapter 2: The Internet in IoT -- 2.1 The Open System Interconnection Model -- 2.2 End-to-End View of the OSI Model -- 2.3 Transmission Control Protocol/Internet Protocol (TCP/IP) -- 2.3.1 TCP/IP Layer 4: Application Layer -- 2.3.2 TCP/IP Layer 3: Transport Layer -- 2.3.3 TCP/IP Layer 2: Internet Layer -- 2.3.3.1 Router Main Components -- 2.3.4 TCP/IP Layer 1: Network Access Layer -- 2.4 IoT Network Level: Key Performance Characteristics -- 2.4.1 End-to-End Delay -- 2.4.2 Packet Loss -- 2.4.3 Throughput -- 2.5 Internet Protocol Suite -- 2.5.1 IoT Network Level: Addressing -- 2.5.1.1 IP Version 4 -- IPv4 Subnet Mask.
IPv4 Classes -- 2.5.1.2 IP Version 6 -- 2.5.2 IPv6 Address Notation -- 2.5.3 IoT Network Level: Routing -- 2.5.3.1 Interior Routing Protocols -- 2.5.3.2 Exterior Routing Protocols -- 2.6 Summary -- References -- Chapter 3: The Things in IoT: Sensors and Actuators -- 3.1 Introduction -- 3.2 IoT Sensors -- 3.2.1 Definition -- 3.2.2 Why Sensors -- 3.2.3 Sensor Types -- 3.2.4 Sensor Characteristics -- 3.3 RFID -- 3.3.1 RFID Main Usage and Applications -- 3.4 Video Tracking -- 3.4.1 Video Tracking Applications -- 3.4.2 Video Tracking Algorithms -- 3.5 IoT Actuators -- 3.5.1 Definition -- 3.5.2 Why Actuators? -- 3.5.3 Actuator Types -- 3.5.4 Controlling IoT Devices -- 3.6 How Things Are Identified in IoT? -- 3.7 Summary -- References -- Chapter 4: IoT Requirements for Networking Protocols -- 4.1 Support for Constrained Devices -- 4.2 Massive Scalability -- 4.2.1 Device Addressing -- 4.2.2 Credentials Management -- 4.2.3 Control Plane -- 4.2.4 Wireless Spectrum -- 4.3 Determinism -- 4.4 Security and Privacy -- 4.5 Application Interoperability -- 4.5.1 Abstractions and Standard APIs -- 4.5.2 Semantic Interoperability -- 4.6 Summary -- References -- Chapter 5: IoT Protocol Stack: A Layered View -- 5.1 Link Layer -- 5.1.1 Challenges -- 5.1.2 Industry Progress -- 5.1.2.1 IEEE 802.15.4 -- 5.1.2.2 IEEE 802.15.4e TSCH -- 5.1.2.3 LPWAN -- LoRaWAN -- Network Architecture -- Device Class Capabilities -- Scalability -- Energy Efficiency -- Security -- Regional Variations -- Challenges -- NB-IoT -- Network Architecture -- Device Categories -- Scalability -- Energy Efficiency -- Security -- Comparison of LoRaWAN and NB-IoT -- 5.1.2.4 IEEE 802.11ah -- Short MAC Header -- Large Number of Stations -- Speeding Frame Exchanges -- Relay -- Target Wake Time -- Grouping -- Traffic Indication Map (TIM) and Paging Mechanism -- Restricted Access Windows.
5.1.2.5 Comparison of Wireless Link Layer Protocols -- 5.1.2.6 Time-Sensitive Networking -- IEEE 802.1Qca -- IEEE 802.1Qbv -- IEEE 802.1CB -- 5.2 Internet Layer -- 5.2.1 Challenges -- 5.2.2 Industry Progress -- 5.2.2.1 6LowPAN -- 5.2.2.2 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks -- 5.2.2.3 6TiSCH -- Network Formation -- Network Maintenance -- Topology and Schedule Mapping -- Resource Management -- Flow Control -- Determinism -- Scheduling Mechanisms -- Secure Communication -- 5.3 Application Protocols Layer -- 5.3.1 Data Serialization Formats -- 5.3.2 Communication Paradigms -- 5.3.2.1 Request/Response Versus Publish/Subscribe -- 5.3.2.2 Blocking Versus Non-blocking -- 5.3.3 QoS -- 5.3.3.1 Resource Utilization -- Resource Limits Policy -- Time Filter Policy -- 5.3.3.2 Data Timeliness -- Deadline Policy -- Latency Budget Policy -- 5.3.3.3 Data Availability -- Durability Policy -- Life Span Policy -- History Policy -- 5.3.3.4 Data Delivery -- Reliability Policy -- Transport Priority -- 5.3.4 RESTful Constraints -- 5.3.5 Survey of IoT Application Protocols -- 5.3.5.1 CoAP -- 5.3.5.2 XMPP -- 5.3.5.3 MQTT -- 5.3.5.4 AMQP -- 5.3.5.5 SIP -- 5.3.5.6 IEEE 1888 -- 5.3.5.7 DDS RTPS -- 5.4 Application Services Layer -- 5.4.1 Motivation -- 5.4.2 Industry Progress -- 5.4.2.1 ETSI M2M -- 5.4.2.2 oneM2M -- 5.4.3 Technology Gaps -- 5.5 Summary -- References -- Chapter 6: Fog Computing -- 6.1 Defining Fog Computing -- 6.2 Drivers for Fog -- 6.2.1 Data Deluge -- 6.2.2 Rapid Mobility -- 6.2.3 Reliable Control -- 6.2.4 Data Management and Analytics -- 6.3 Characteristics of Fog -- 6.4 Enabling Technologies and Prerequisites -- 6.4.1 Virtualization Technologies -- 6.4.1.1 Containers and Virtual Machines -- 6.4.1.2 Docker -- 6.4.1.3 Application Mobility -- 6.4.2 Network Support for Mobility -- 6.4.2.1 EVPN.
Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.2.2 LISP -- Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.3 Fog Orchestration -- 6.4.3.1 Topology -- 6.4.3.2 Things Connectivity -- 6.4.3.3 Network Performance Guarantees -- 6.4.4 Data Management -- 6.4.4.1 Data in Motion -- 6.4.4.2 Search Technologies and Engines -- 6.4.5 More Gaps Ahead -- 6.5 Summary -- References -- Chapter 7: IoT Services Platform: Functions and Requirements -- 7.1 IoT Services Platform Functions -- 7.2 IoT Platform Manager -- 7.3 Discovery: Entities, Services, and Location -- 7.3.1 Registration -- 7.3.2 Discovery -- 7.4 Communication Manager -- 7.5 Data Management and Repository -- 7.6 Element Manager (Managing IoT Devices and Network Elements) -- 7.6.1 Configuration (and Provisioning) Management -- 7.6.2 Fault Management -- 7.6.3 Performance Management -- 7.6.4 Important Performance Measures for IoT Devices (E.g., Sensors) -- 7.6.5 Security Management -- 7.7 Firmware Manager -- 7.8 Topology Manager -- 7.9 Group Manager -- 7.10 Billing and Accounting -- 7.11 Subscription and Notification Manager -- 7.12 API Manager -- 7.13 Commercially Available IoT Platforms -- 7.14 Putting All Together -- 7.15 Summary -- References -- Chapter 8: Internet of Things Security and Privacy -- 8.1 Introduction -- 8.2 IoT Security Challenges -- 8.3 IoT Security Requirements -- 8.4 IoT Three-Domain Architecture -- 8.5 Cloud Domain Attacks and Countermeasures -- 8.6 Fog Domain Attacks and Countermeasures -- 8.7 Sensing Domain Attacks and Countermeasures -- 8.8 Securing IoT Devices -- 8.8.1 IoT Devices Gone Rogue -- 8.8.1.1 Botnets -- 8.8.1.2 Webcams -- 8.8.1.3 Casino Fish Tank -- 8.8.1.4 Cardiac Devices -- 8.8.1.5 Vehicles -- 8.8.2 MUD -- 8.8.3 DICE -- 8.9 Summary and Future Directions -- References.
Chapter 9: IoT Vertical Markets and Connected Ecosystems -- 9.1 IoT Verticals -- 9.1.1 IoT Agriculture and Farming -- 9.1.2 IoT Energy Solutions -- 9.1.3 IoT Oil and Gas Solutions -- 9.1.3.1 Oil and Gas Exercise -- 9.1.4 IoT Smart Building Solutions -- 9.1.5 IoT Finance -- 9.1.6 IoT Healthcare -- 9.1.7 IoT Industrial -- 9.1.8 IoT Retail -- 9.1.9 IoT Transportation -- 9.2 IoT Service Model: Anything as a Service -- 9.2.1 Thrust as a Service -- 9.2.2 Imaging as a Service -- 9.2.3 Farming as a Service -- 9.2.4 IT as a Service -- 9.3 Enabling "Anything as a Service" -- 9.3.1 Example: IoT IT Services -- 9.4 Connected Ecosystems -- 9.4.1 IoT Services Terminologies -- 9.4.2 IoT Connected Ecosystems Models -- 9.4.3 IoT Connected Ecosystems Models Key Capabilities -- 9.5 Summary -- References -- Chapter 10: The Blockchain in IoT -- 10.1 Introduction -- 10.2 What Is the Blockchain? -- 10.2.1 Bitcoin and Blockchain -- 10.2.2 Evolution of Blockchain -- 10.2.3 Defining Blockchain -- 10.3 How Blockchains Work -- 10.3.1 Anatomy of the Blockchain -- 10.3.2 Understanding a Block's Hash -- 10.3.3 Lifecycle of a Transaction -- 10.4 Features of Blockchain -- 10.4.1 Consensus Algorithms in IoT -- 10.4.2 Cryptography -- 10.4.3 Decentralized -- 10.4.4 Transparency and Trust -- 10.4.5 Permissioned, Permissionless, and Consortium -- 10.4.6 Smart Contracts -- 10.4.7 Advantages and Disadvantages -- 10.5 Blockchain Applications in IoT -- 10.5.1 M2M Transactions -- 10.5.2 Energy Management -- 10.5.3 Supply Chain Management -- 10.5.4 Healthcare -- 10.5.5 Retail -- 10.5.6 Automotive and Transportation -- 10.5.7 Smart City -- 10.5.8 Identity, Authentication, and Access Management -- 10.5.9 Other Blockchain IoT Applications -- 10.6 Blockchain Security in IoT -- 10.6.1 Trust Between Nodes -- 10.6.2 Malicious Activity and Cryptographic Principles.
10.6.3 IoT Security and Blockchain Advantages.
Record Nr. UNINA-9910551825403321
Rayes Ammar  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of things from hype to reality : the road to digitization / / Ammar Rayes and Samer Salam
Internet of things from hype to reality : the road to digitization / / Ammar Rayes and Samer Salam
Autore Rayes Ammar
Edizione [3rd ed.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (471 pages)
Disciplina 004.678
Soggetto topico Internet of things
Internet of things - Equipment and supplies
ISBN 3-030-90158-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword I -- Foreword II -- Preface -- Acknowledgments -- Disclaimer -- Contents -- About the Authors -- Chapter 1: Internet of Things (IoT) Overview -- 1.1 What Is the Internet of Things (IoT)? -- 1.1.1 Background and More Complete IoT Definition -- 1.1.2 How to Monitor and Control Things from Anywhere in the World? -- 1.1.3 Why Do We Want to Monitor and Control Things? -- 1.1.4 Who Will Monitor and Control? -- 1.1.5 How Is Security Guaranteed? -- 1.2 IoT Reference Framework -- 1.3 Why Now? The 12 Factors for a Perfect Storm -- 1.3.1 Convergence of IT and OT -- 1.3.2 The Astonishing Introduction of Creative Internet-Based Businesses -- 1.3.2.1 Uber -- 1.3.2.2 Airbnb -- 1.3.2.3 Square -- 1.3.2.4 Amazon -- 1.3.2.5 Tesla -- 1.3.2.6 Self-Driving Cars -- 1.3.3 Mobile Device Explosion -- 1.3.4 Social Network Explosion -- 1.3.5 Analytics at the Edge -- 1.3.6 Cloud Computing and Virtualization -- 1.3.7 Technology Explosion -- 1.3.8 Digital Convergence/Transformation -- 1.3.9 Enhanced User Interfaces -- 1.3.10 Fast Rate of IoT Technology Adoption (Five Times More than Electricity and Telephony) -- 1.3.11 The Rise of Security Requirements -- 1.3.12 The Nonstop Moore's Law -- 1.4 History of the Internet -- 1.5 Summary -- References -- Chapter 2: The Internet in IoT -- 2.1 The Open System Interconnection Model -- 2.2 End-to-End View of the OSI Model -- 2.3 Transmission Control Protocol/Internet Protocol (TCP/IP) -- 2.3.1 TCP/IP Layer 4: Application Layer -- 2.3.2 TCP/IP Layer 3: Transport Layer -- 2.3.3 TCP/IP Layer 2: Internet Layer -- 2.3.3.1 Router Main Components -- 2.3.4 TCP/IP Layer 1: Network Access Layer -- 2.4 IoT Network Level: Key Performance Characteristics -- 2.4.1 End-to-End Delay -- 2.4.2 Packet Loss -- 2.4.3 Throughput -- 2.5 Internet Protocol Suite -- 2.5.1 IoT Network Level: Addressing -- 2.5.1.1 IP Version 4 -- IPv4 Subnet Mask.
IPv4 Classes -- 2.5.1.2 IP Version 6 -- 2.5.2 IPv6 Address Notation -- 2.5.3 IoT Network Level: Routing -- 2.5.3.1 Interior Routing Protocols -- 2.5.3.2 Exterior Routing Protocols -- 2.6 Summary -- References -- Chapter 3: The Things in IoT: Sensors and Actuators -- 3.1 Introduction -- 3.2 IoT Sensors -- 3.2.1 Definition -- 3.2.2 Why Sensors -- 3.2.3 Sensor Types -- 3.2.4 Sensor Characteristics -- 3.3 RFID -- 3.3.1 RFID Main Usage and Applications -- 3.4 Video Tracking -- 3.4.1 Video Tracking Applications -- 3.4.2 Video Tracking Algorithms -- 3.5 IoT Actuators -- 3.5.1 Definition -- 3.5.2 Why Actuators? -- 3.5.3 Actuator Types -- 3.5.4 Controlling IoT Devices -- 3.6 How Things Are Identified in IoT? -- 3.7 Summary -- References -- Chapter 4: IoT Requirements for Networking Protocols -- 4.1 Support for Constrained Devices -- 4.2 Massive Scalability -- 4.2.1 Device Addressing -- 4.2.2 Credentials Management -- 4.2.3 Control Plane -- 4.2.4 Wireless Spectrum -- 4.3 Determinism -- 4.4 Security and Privacy -- 4.5 Application Interoperability -- 4.5.1 Abstractions and Standard APIs -- 4.5.2 Semantic Interoperability -- 4.6 Summary -- References -- Chapter 5: IoT Protocol Stack: A Layered View -- 5.1 Link Layer -- 5.1.1 Challenges -- 5.1.2 Industry Progress -- 5.1.2.1 IEEE 802.15.4 -- 5.1.2.2 IEEE 802.15.4e TSCH -- 5.1.2.3 LPWAN -- LoRaWAN -- Network Architecture -- Device Class Capabilities -- Scalability -- Energy Efficiency -- Security -- Regional Variations -- Challenges -- NB-IoT -- Network Architecture -- Device Categories -- Scalability -- Energy Efficiency -- Security -- Comparison of LoRaWAN and NB-IoT -- 5.1.2.4 IEEE 802.11ah -- Short MAC Header -- Large Number of Stations -- Speeding Frame Exchanges -- Relay -- Target Wake Time -- Grouping -- Traffic Indication Map (TIM) and Paging Mechanism -- Restricted Access Windows.
5.1.2.5 Comparison of Wireless Link Layer Protocols -- 5.1.2.6 Time-Sensitive Networking -- IEEE 802.1Qca -- IEEE 802.1Qbv -- IEEE 802.1CB -- 5.2 Internet Layer -- 5.2.1 Challenges -- 5.2.2 Industry Progress -- 5.2.2.1 6LowPAN -- 5.2.2.2 RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks -- 5.2.2.3 6TiSCH -- Network Formation -- Network Maintenance -- Topology and Schedule Mapping -- Resource Management -- Flow Control -- Determinism -- Scheduling Mechanisms -- Secure Communication -- 5.3 Application Protocols Layer -- 5.3.1 Data Serialization Formats -- 5.3.2 Communication Paradigms -- 5.3.2.1 Request/Response Versus Publish/Subscribe -- 5.3.2.2 Blocking Versus Non-blocking -- 5.3.3 QoS -- 5.3.3.1 Resource Utilization -- Resource Limits Policy -- Time Filter Policy -- 5.3.3.2 Data Timeliness -- Deadline Policy -- Latency Budget Policy -- 5.3.3.3 Data Availability -- Durability Policy -- Life Span Policy -- History Policy -- 5.3.3.4 Data Delivery -- Reliability Policy -- Transport Priority -- 5.3.4 RESTful Constraints -- 5.3.5 Survey of IoT Application Protocols -- 5.3.5.1 CoAP -- 5.3.5.2 XMPP -- 5.3.5.3 MQTT -- 5.3.5.4 AMQP -- 5.3.5.5 SIP -- 5.3.5.6 IEEE 1888 -- 5.3.5.7 DDS RTPS -- 5.4 Application Services Layer -- 5.4.1 Motivation -- 5.4.2 Industry Progress -- 5.4.2.1 ETSI M2M -- 5.4.2.2 oneM2M -- 5.4.3 Technology Gaps -- 5.5 Summary -- References -- Chapter 6: Fog Computing -- 6.1 Defining Fog Computing -- 6.2 Drivers for Fog -- 6.2.1 Data Deluge -- 6.2.2 Rapid Mobility -- 6.2.3 Reliable Control -- 6.2.4 Data Management and Analytics -- 6.3 Characteristics of Fog -- 6.4 Enabling Technologies and Prerequisites -- 6.4.1 Virtualization Technologies -- 6.4.1.1 Containers and Virtual Machines -- 6.4.1.2 Docker -- 6.4.1.3 Application Mobility -- 6.4.2 Network Support for Mobility -- 6.4.2.1 EVPN.
Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.2.2 LISP -- Updating the Identity to Location Address Mappings -- Default IP Gateway Problem -- 6.4.3 Fog Orchestration -- 6.4.3.1 Topology -- 6.4.3.2 Things Connectivity -- 6.4.3.3 Network Performance Guarantees -- 6.4.4 Data Management -- 6.4.4.1 Data in Motion -- 6.4.4.2 Search Technologies and Engines -- 6.4.5 More Gaps Ahead -- 6.5 Summary -- References -- Chapter 7: IoT Services Platform: Functions and Requirements -- 7.1 IoT Services Platform Functions -- 7.2 IoT Platform Manager -- 7.3 Discovery: Entities, Services, and Location -- 7.3.1 Registration -- 7.3.2 Discovery -- 7.4 Communication Manager -- 7.5 Data Management and Repository -- 7.6 Element Manager (Managing IoT Devices and Network Elements) -- 7.6.1 Configuration (and Provisioning) Management -- 7.6.2 Fault Management -- 7.6.3 Performance Management -- 7.6.4 Important Performance Measures for IoT Devices (E.g., Sensors) -- 7.6.5 Security Management -- 7.7 Firmware Manager -- 7.8 Topology Manager -- 7.9 Group Manager -- 7.10 Billing and Accounting -- 7.11 Subscription and Notification Manager -- 7.12 API Manager -- 7.13 Commercially Available IoT Platforms -- 7.14 Putting All Together -- 7.15 Summary -- References -- Chapter 8: Internet of Things Security and Privacy -- 8.1 Introduction -- 8.2 IoT Security Challenges -- 8.3 IoT Security Requirements -- 8.4 IoT Three-Domain Architecture -- 8.5 Cloud Domain Attacks and Countermeasures -- 8.6 Fog Domain Attacks and Countermeasures -- 8.7 Sensing Domain Attacks and Countermeasures -- 8.8 Securing IoT Devices -- 8.8.1 IoT Devices Gone Rogue -- 8.8.1.1 Botnets -- 8.8.1.2 Webcams -- 8.8.1.3 Casino Fish Tank -- 8.8.1.4 Cardiac Devices -- 8.8.1.5 Vehicles -- 8.8.2 MUD -- 8.8.3 DICE -- 8.9 Summary and Future Directions -- References.
Chapter 9: IoT Vertical Markets and Connected Ecosystems -- 9.1 IoT Verticals -- 9.1.1 IoT Agriculture and Farming -- 9.1.2 IoT Energy Solutions -- 9.1.3 IoT Oil and Gas Solutions -- 9.1.3.1 Oil and Gas Exercise -- 9.1.4 IoT Smart Building Solutions -- 9.1.5 IoT Finance -- 9.1.6 IoT Healthcare -- 9.1.7 IoT Industrial -- 9.1.8 IoT Retail -- 9.1.9 IoT Transportation -- 9.2 IoT Service Model: Anything as a Service -- 9.2.1 Thrust as a Service -- 9.2.2 Imaging as a Service -- 9.2.3 Farming as a Service -- 9.2.4 IT as a Service -- 9.3 Enabling "Anything as a Service" -- 9.3.1 Example: IoT IT Services -- 9.4 Connected Ecosystems -- 9.4.1 IoT Services Terminologies -- 9.4.2 IoT Connected Ecosystems Models -- 9.4.3 IoT Connected Ecosystems Models Key Capabilities -- 9.5 Summary -- References -- Chapter 10: The Blockchain in IoT -- 10.1 Introduction -- 10.2 What Is the Blockchain? -- 10.2.1 Bitcoin and Blockchain -- 10.2.2 Evolution of Blockchain -- 10.2.3 Defining Blockchain -- 10.3 How Blockchains Work -- 10.3.1 Anatomy of the Blockchain -- 10.3.2 Understanding a Block's Hash -- 10.3.3 Lifecycle of a Transaction -- 10.4 Features of Blockchain -- 10.4.1 Consensus Algorithms in IoT -- 10.4.2 Cryptography -- 10.4.3 Decentralized -- 10.4.4 Transparency and Trust -- 10.4.5 Permissioned, Permissionless, and Consortium -- 10.4.6 Smart Contracts -- 10.4.7 Advantages and Disadvantages -- 10.5 Blockchain Applications in IoT -- 10.5.1 M2M Transactions -- 10.5.2 Energy Management -- 10.5.3 Supply Chain Management -- 10.5.4 Healthcare -- 10.5.5 Retail -- 10.5.6 Automotive and Transportation -- 10.5.7 Smart City -- 10.5.8 Identity, Authentication, and Access Management -- 10.5.9 Other Blockchain IoT Applications -- 10.6 Blockchain Security in IoT -- 10.6.1 Trust Between Nodes -- 10.6.2 Malicious Activity and Cryptographic Principles.
10.6.3 IoT Security and Blockchain Advantages.
Record Nr. UNISA-996464543103316
Rayes Ammar  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Optimal localization of internet of things nodes / / Sheetal N. Ghorpade, Marco Zennaro and Bharat S. Chaudhari
Optimal localization of internet of things nodes / / Sheetal N. Ghorpade, Marco Zennaro and Bharat S. Chaudhari
Autore Ghorpade Sheetal N.
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2021]
Descrizione fisica 1 online resource (129 pages)
Disciplina 004.678
Collana SpringerBriefs in Applied Sciences and Technology
Soggetto topico Internet of things - Equipment and supplies
Internet of things
ISBN 3-030-88095-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523733203321
Ghorpade Sheetal N.  
Cham, Switzerland : , : Springer International Publishing, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui