Description
Efnisyfirlit
- Internet of Things
- Copyright
- Contents
- About the Authors
- Foreword to the First Edition by Zach Shelby
- Foreword to the First Edition by Geoff Mulligan
- Foreword to the Second Edition by Geoff Mulligan
- Preface
- Introduction
- Structure of the Book
- Part 1: The Evolving IoT Landscape
- Chapter 1: Why the Internet of Things?
- Chapter 2: Origins and IoT Landscape
- Chapter 3: IoT – A Business Perspective
- Chapter 4: An Architecture Perspective
- Part 2: IoT Technologies and Architectures
- Chapter 5: Technology Fundamentals
- Chapter 6: Security
- Chapter 7: Architecture and State-of-the-Art
- Chapter 8: Architecture Reference Model
- Chapter 9: Designing the Internet of Things for the Real-World
- Part 3: IoT Use Cases
- Chapter 10: Asset Management
- Chapter 11: Industrial Automation
- Chapter 12: Smart Grid
- Chapter 13: Commercial Building Automation
- Chapter 14: Smart Cities
- Chapter 15: Participatory Sensing
- Chapter 16: Autonomous Vehicles and Systems of Cyber-Physical Systems
- Chapter 17: Logistics
- Chapter 18: Conclusions and Looking Ahead
- Appendix A: ETSI M2M
- Acknowledgments
- Part 1 The Evolving IoT Landscape
- 1 Why the Internet of Things?
- 2 Origins and IoT Landscape
- 2.1 Introduction
- 2.2 Evolving to an Internet of Things
- 2.2.1 A brief background
- 2.2.2 A simple enterprise IoT solution overview
- 2.2.3 The Internet of Things ahead
- 2.3 IoT in a Global Context
- 2.3.1 Game changers
- 2.3.2 General technology and scientific trends
- 2.3.3 Trends in information and communications technologies
- 2.3.4 Expected capabilities
- 2.3.5 Implications for IoT
- 2.3.6 Barriers and concerns
- 2.4 A Use Case Example
- 2.5 A Shift in Mindset
- 3 IoT – A Business Perspective
- 3.1 Introduction
- 3.1.1 Information marketplaces
- 3.2 Definitions
- 3.2.1 Global value chains
- 3.2.2 Ecosystems vs. value chains
- 3.2.3 Industrial structure
- 3.3 Value Chains Overview
- 3.4 IoT Value Chain Example
- 3.5 An Emerging Industrial Structure for IoT
- 3.5.1 The Information-Driven Global Value Chain
- 3.5.1.1 Inputs to the information-driven global commodity chain
- 3.5.1.2 Production processes of the information-driven global value chain
- 3.6 The International-Driven Global Value Chain and Global Information Monopolies
- 3.7 Business Model Innovation in IoT
- 3.7.1 Current examples
- 3.7.2 Business to Business models
- 3.7.3 Data analytics business models
- 3.7.4 New data marketplaces models
- 3.7.5 SLA security integration
- 3.8 Conclusions
- 4 An Architecture Perspective
- 4.1 Building an Architecture
- 4.2 Requirements and Main Design Principles
- 4.3 An IoT Architecture Outline
- 4.4 Standards Considerations
- Part 2 IoT Technologies and Architectures
- 5 Technology Fundamentals
- 5.1 Devices and Gateways
- 5.1.1 Introduction
- 5.1.1.1 Device types
- 5.1.1.2 Deployment scenarios for devices
- 5.1.2 Basic devices
- 5.1.3 Gateways
- 5.1.3.1 Data Management
- 5.1.3.2 Local applications
- 5.1.3.3 Device Management
- 5.1.4 Advanced devices
- 5.1.5 Summary and vision
- 5.2 Local and Wide Area Networking
- 5.2.1 The need for networking
- 5.2.2 Wide Area Networking
- 5.2.2.1 3rd Generation Partnership Project technologies and Machine Type Communications
- 5.2.3 Low-Power Wide Area Networks
- 5.2.3.1 3GPP Licensed Spectrum LPWA Technologies
- 5.2.3.2 Proprietary LPWA technologies
- 5.2.3.3 LPWA standards landscape
- 5.2.4 Local Area Networking
- 5.2.4.1 Deployment considerations
- 5.2.4.2 Key technologies
- 5.3 Machine Intelligence
- 5.3.1 The role of Machine Intelligence in IoT
- 5.3.2 Machine Intelligence overview
- 5.3.3 Considerations when using MI for IoT data
- 5.3.4 A framework of MI for IoT
- 5.3.5 Industrial Internet Analytics Framework
- 5.3.6 Conclusions
- 5.4 Distributed Cloud and Edge Computing
- 5.4.1 A new software delivery model
- 5.4.2 Cloud fundamentals
- 5.4.3 Computing at the edge
- 5.4.4 Considerations and conclusions
- 5.5 Data Management
- 5.5.1 Introduction
- 5.5.2 Managing IoT data flow
- 5.5.2.1 Data generation
- 5.5.2.2 Data acquisition
- 5.5.2.3 Data validation
- 5.5.2.4 Data storage
- 5.5.2.5 Data processing
- 5.5.2.6 Data remanence
- 5.5.2.7 Data analysis
- 5.5.3 IoT data considerations
- 5.5.4 Conclusions
- 5.6 Business Processes in IoT
- 5.6.1 Introduction
- 5.6.2 IoT integration with enterprise systems
- 5.6.3 Distributed business processes in IoT
- 5.6.4 Considerations
- 5.6.5 Conclusions
- 5.7 Distributed Ledgers and Applications
- 5.7.1 DLT, IoT, and Data Ownership
- 6 Security
- 6.1 Introduction
- 6.2 Basic Principles
- 6.2.1 Encryption
- 6.2.1.1 Ciphers
- 6.2.1.2 Symmetric ciphers
- 6.2.1.3 Asymmetric ciphers
- 6.2.2 Authentication
- 6.2.2.1 Symmetric authentication
- 6.2.2.2 Asymmetric authentication
- 6.2.2.3 Application of authentication
- 6.3 Threats to IoT Systems
- 6.3.1 Denial of Service (DoS) Attacks
- 6.3.2 Sybil attacks
- 6.3.3 Privacy attacks
- 6.3.4 “Hole” attacks
- 6.3.5 Physical attacks
- 6.4 Mitigating Threats to IoT Applications
- 6.4.1 Application layer and physical attacks
- 6.4.2 Transport layer
- 6.4.3 Network layer
- 6.4.4 Data Link/Medium Access Control layer
- 6.4.5 Physical layer
- 6.5 Security in Architectures and Standards
- 6.5.1 IETF
- 6.5.2 3GPP and low-power Wide Area Networks
- 6.6 Security for a Safe IoT
- 6.6.1 Safety in industrial automation and robotics
- 6.6.2 Safety in automotive systems
- 6.6.3 Safety in Smart Cities
- 6.7 Privacy in IoT
- 6.8 Future Developments in Security
- 7 Architecture and State-of-the-Art
- 7.1 Introduction
- 7.2 ITU-T
- 7.3 IETF
- 7.3.1 Introduction
- 7.3.2 IETF IoT-related Working Groups
- 7.3.3 IETF fragments of an architecture
- 7.4 OMA
- 7.5 IoT-A and IIRA
- 7.6 RAMI 4.0
- 7.7 W3C
- 7.8 OGC
- 7.9 GS1 Architecture and Technologies
- 7.9.1 GS1 Identify
- 7.9.2 GS1 Capture
- 7.9.3 GS1 Share
- 7.9.4 EPCIS architecture and technologies
- 7.10 Other Relevant State-of-the-Art
- 7.10.1 oneM2M
- 7.10.2 OCF
- 7.10.3 IEEE
- 7.10.4 IEC/ISO: ISO/IEC JTC 1/WG 10/SC 41
- 7.10.5 AIOTI
- 7.10.6 NIST CPS
- 7.11 Conclusions
- 8 Architecture Reference Model
- 8.1 Introduction
- 8.2 Reference Model and Architecture
- 8.3 IoT Reference Model
- 8.3.1 IoT Domain Model
- 8.3.1.1 Model notation and semantics
- 8.3.1.2 Main concepts
- 8.3.1.3 Further considerations
- 8.3.2 Information model
- 8.3.3 Functional model
- 8.3.3.1 Device Functional Group
- 8.3.3.2 Communication Functional Group
- 8.3.3.3 IoT Service Functional Group
- 8.3.3.4 Virtual Entity Functional Group
- 8.3.3.5 IoT Service Organization Functional Group
- 8.3.3.6 IoT Process Management Functional Group
- 8.3.3.7 Management Functional Group
- 8.3.3.8 Security Functional Group
- 8.3.3.9 Application Functional Group
- 8.3.3.10 Modular IoT functions
- 8.3.4 Communication model
- 8.3.5 Safety, privacy, trust, security model
- 8.3.5.1 Safety
- 8.3.5.2 Privacy
- 8.3.5.3 Trust
- 8.3.5.4 Security
- 8.4 IoT Reference Architecture
- 8.5 Functional View
- 8.5.1 Device and Application Functional Group
- 8.5.2 Communication Functional Group
- 8.5.3 IoT Service Functional Group
- 8.5.4 Virtual Entity Functional Group
- 8.5.5 IoT Process Management Functional Group
- 8.5.6 Service Organization Functional Group
- 8.5.7 Security Functional Group
- 8.5.8 Management Functional Group
- 8.6 Information View
- 8.6.1 Information description
- 8.6.2 Information flow and lifecycle
- 8.6.3 Information handling
- 8.7 Deployment and Operational View
- 8.8 Other Relevant Architectural Views
- 8.9 Other Reference Models and Architectures
- 8.9.1 Industrial Internet Reference Architecture
- 8.9.1.1 IIRA Usage Viewpoint
- 8.9.1.2 IIRA Functional Viewpoint
- 8.9.1.3 IIRA Implementation viewpoint
- 8.10 Best Practices
- 8.11 Conclusions
- 9 Designing the Internet of Things for the Real World
- 9.1 Introduction
- 9.2 Technical Design Constraints – Hardware Is Popular Again
- 9.2.1 Devices and networks
- 9.2.1.1 Functional requirements
- 9.2.1.2 Sensing and communications field
- 9.2.1.3 Programming and embedded intelligence
- 9.2.1.4 Power
- 9.2.1.5 Gateway
- 9.2.1.6 Nonfunctional requirements
- 9.2.1.7 Financial cost
- 9.3 Data Representation and Visualization
- 9.4 Interaction and Remote Control
- Part 3 IoT Use Cases
- 10 Asset Management
- 10.1 Introduction
- 10.2 Expected Benefits
- 10.3 e-Maintenance in the IoT Era
- 10.4 Hazardous Goods Management in the IoT Era
- 10.5 Conclusions
- 11 Industrial Automation
- 11.1 SOA-Based Device Integration
- 11.2 SOCRADES: Realizing the Enterprise Integrated Web of Things
- 11.3 IMC-AESOP: From the Web of Things to the Cloud of Things
- 11.4 Conclusions
- 12 Smart Grid
- 12.1 Introduction
- 12.2 Smart Metering
- 12.3 Smart House
- 12.4 Smart Grid City
- 12.5 Conclusions
- 13 Commercial Building Automation
- 13.1 Introduction
- 13.2 Case Study: Phase One – Commercial Building Automation Today
- 13.2.1 Background
- 13.2.2 Technology overview
- 13.2.3 Value chain
- 13.3 Case Study: Phase Two – Commercial Building Automation in the Future
- 13.3.1 Evolution of commercial building automation
- 13.3.2 Background
- 13.3.3 Technology overview
- 13.3.4 Evolved value chain for commercial building automation
- 14 Smart Cities
- 14.1 Introduction – What Is a Smart City?
- 14.2 Smart Cities – A Technical Perspective
- 14.3 IoT Data Supply Chains
- 14.4 IoT Data and Context Management in Smart Cities
- 14.5 ETSI ISC Context Information Management
- 14.6 Smart Cities – A Reference Architecture
- 14.7 Smart Cities – Smart Parking
- 15 Participatory Sensing
- 15.1 Introduction
- 15.2 Roles, Actors, Engagement
- 15.2.1 Collective design and investigation
- 15.2.2 Public contribution
- 15.2.3 Personal use and reflection
- 15.3 Participatory Sensing Process
- 15.4 Technology Overview
- 15.5 An Early Scenario
- 15.6 Recent Trends
- 15.6.1 Citizen journalism
- 15.6.2 Passive participation
- 15.6.3 Social Sensing
- 15.7 A Modern Example
- 15.8 Conclusions
- 16 Autonomous Vehicles and Systems of Cyber-Physical Systems
- 16.1 Introduction
- 16.2 Autonomous Cars
- 16.2.1 A very brief history of autonomous cars
- 16.2.2 Enabling technologies
- 16.2.3 Regulation, governance, and ethics
- 16.2.4 Other autonomous passenger vehicles
- 16.3 Other Autonomous Systems
- 16.3.1 Autonomous rail
- 16.3.2 Unmanned aerial systems
- 16.3.3 Unmanned Autonomous Underwater Vehicles and Systems
- 16.4 Intelligent Infrastructure
- 16.5 Convergence and Systems of Cyber-Physical Systems
- 16.6 Cyber-Physical Systems Challenges and Opportunities
- 17 Logistics
- 17.1 Introduction
- 17.2 Roles and Actors
- 17.3 Technology Overview
- 17.3.1 Identification of the Things
- 17.3.2 Main technologies
- 17.4 Example Scenario – Food Transport
- 17.5 Conclusions
- 18 Conclusions and Looking Ahead
- A ETSI M2M
- A.1 Introduction
- A.1.1 ETSI M2M high-level architecture
- A.1.2 ETSI M2M Service Capabilities
- A.1.3 ETSI M2M interfaces
- A.1.4 ETSI M2M resource management
- Abbreviations
- Bibliography
- Index
- Back Cover