Internet of Things

Höfundur Vlasios Tsiatsis; Stamatis Karnouskos; Jan Holler; David Boyle; Catherine Mulligan

Útgefandi Elsevier S & T

Snið Page Fidelity

Print ISBN 9780128144350

Útgáfa 2

Útgáfuár 2019

12.290 kr.

Description

Efnisyfirlit

  • Internet of Things
  • Copyright
  • Contents
  • About the Authors
  • Foreword to the First Edition by Zach Shelby
  • Foreword to the First Edition by Geoff Mulligan
  • Foreword to the Second Edition by Geoff Mulligan
  • Preface
  • Introduction
  • Structure of the Book
  • Part 1: The Evolving IoT Landscape
  • Chapter 1: Why the Internet of Things?
  • Chapter 2: Origins and IoT Landscape
  • Chapter 3: IoT – A Business Perspective
  • Chapter 4: An Architecture Perspective
  • Part 2: IoT Technologies and Architectures
  • Chapter 5: Technology Fundamentals
  • Chapter 6: Security
  • Chapter 7: Architecture and State-of-the-Art
  • Chapter 8: Architecture Reference Model
  • Chapter 9: Designing the Internet of Things for the Real-World
  • Part 3: IoT Use Cases
  • Chapter 10: Asset Management
  • Chapter 11: Industrial Automation
  • Chapter 12: Smart Grid
  • Chapter 13: Commercial Building Automation
  • Chapter 14: Smart Cities
  • Chapter 15: Participatory Sensing
  • Chapter 16: Autonomous Vehicles and Systems of Cyber-Physical Systems
  • Chapter 17: Logistics
  • Chapter 18: Conclusions and Looking Ahead
  • Appendix A: ETSI M2M
  • Acknowledgments
  • Part 1 The Evolving IoT Landscape
  • 1 Why the Internet of Things?
  • 2 Origins and IoT Landscape
  • 2.1 Introduction
  • 2.2 Evolving to an Internet of Things
  • 2.2.1 A brief background
  • 2.2.2 A simple enterprise IoT solution overview
  • 2.2.3 The Internet of Things ahead
  • 2.3 IoT in a Global Context
  • 2.3.1 Game changers
  • 2.3.2 General technology and scientific trends
  • 2.3.3 Trends in information and communications technologies
  • 2.3.4 Expected capabilities
  • 2.3.5 Implications for IoT
  • 2.3.6 Barriers and concerns
  • 2.4 A Use Case Example
  • 2.5 A Shift in Mindset
  • 3 IoT – A Business Perspective
  • 3.1 Introduction
  • 3.1.1 Information marketplaces
  • 3.2 Definitions
  • 3.2.1 Global value chains
  • 3.2.2 Ecosystems vs. value chains
  • 3.2.3 Industrial structure
  • 3.3 Value Chains Overview
  • 3.4 IoT Value Chain Example
  • 3.5 An Emerging Industrial Structure for IoT
  • 3.5.1 The Information-Driven Global Value Chain
  • 3.5.1.1 Inputs to the information-driven global commodity chain
  • 3.5.1.2 Production processes of the information-driven global value chain
  • 3.6 The International-Driven Global Value Chain and Global Information Monopolies
  • 3.7 Business Model Innovation in IoT
  • 3.7.1 Current examples
  • 3.7.2 Business to Business models
  • 3.7.3 Data analytics business models
  • 3.7.4 New data marketplaces models
  • 3.7.5 SLA security integration
  • 3.8 Conclusions
  • 4 An Architecture Perspective
  • 4.1 Building an Architecture
  • 4.2 Requirements and Main Design Principles
  • 4.3 An IoT Architecture Outline
  • 4.4 Standards Considerations
  • Part 2 IoT Technologies and Architectures
  • 5 Technology Fundamentals
  • 5.1 Devices and Gateways
  • 5.1.1 Introduction
  • 5.1.1.1 Device types
  • 5.1.1.2 Deployment scenarios for devices
  • 5.1.2 Basic devices
  • 5.1.3 Gateways
  • 5.1.3.1 Data Management
  • 5.1.3.2 Local applications
  • 5.1.3.3 Device Management
  • 5.1.4 Advanced devices
  • 5.1.5 Summary and vision
  • 5.2 Local and Wide Area Networking
  • 5.2.1 The need for networking
  • 5.2.2 Wide Area Networking
  • 5.2.2.1 3rd Generation Partnership Project technologies and Machine Type Communications
  • 5.2.3 Low-Power Wide Area Networks
  • 5.2.3.1 3GPP Licensed Spectrum LPWA Technologies
  • 5.2.3.2 Proprietary LPWA technologies
  • 5.2.3.3 LPWA standards landscape
  • 5.2.4 Local Area Networking
  • 5.2.4.1 Deployment considerations
  • 5.2.4.2 Key technologies
  • 5.3 Machine Intelligence
  • 5.3.1 The role of Machine Intelligence in IoT
  • 5.3.2 Machine Intelligence overview
  • 5.3.3 Considerations when using MI for IoT data
  • 5.3.4 A framework of MI for IoT
  • 5.3.5 Industrial Internet Analytics Framework
  • 5.3.6 Conclusions
  • 5.4 Distributed Cloud and Edge Computing
  • 5.4.1 A new software delivery model
  • 5.4.2 Cloud fundamentals
  • 5.4.3 Computing at the edge
  • 5.4.4 Considerations and conclusions
  • 5.5 Data Management
  • 5.5.1 Introduction
  • 5.5.2 Managing IoT data flow
  • 5.5.2.1 Data generation
  • 5.5.2.2 Data acquisition
  • 5.5.2.3 Data validation
  • 5.5.2.4 Data storage
  • 5.5.2.5 Data processing
  • 5.5.2.6 Data remanence
  • 5.5.2.7 Data analysis
  • 5.5.3 IoT data considerations
  • 5.5.4 Conclusions
  • 5.6 Business Processes in IoT
  • 5.6.1 Introduction
  • 5.6.2 IoT integration with enterprise systems
  • 5.6.3 Distributed business processes in IoT
  • 5.6.4 Considerations
  • 5.6.5 Conclusions
  • 5.7 Distributed Ledgers and Applications
  • 5.7.1 DLT, IoT, and Data Ownership
  • 6 Security
  • 6.1 Introduction
  • 6.2 Basic Principles
  • 6.2.1 Encryption
  • 6.2.1.1 Ciphers
  • 6.2.1.2 Symmetric ciphers
  • 6.2.1.3 Asymmetric ciphers
  • 6.2.2 Authentication
  • 6.2.2.1 Symmetric authentication
  • 6.2.2.2 Asymmetric authentication
  • 6.2.2.3 Application of authentication
  • 6.3 Threats to IoT Systems
  • 6.3.1 Denial of Service (DoS) Attacks
  • 6.3.2 Sybil attacks
  • 6.3.3 Privacy attacks
  • 6.3.4 “Hole” attacks
  • 6.3.5 Physical attacks
  • 6.4 Mitigating Threats to IoT Applications
  • 6.4.1 Application layer and physical attacks
  • 6.4.2 Transport layer
  • 6.4.3 Network layer
  • 6.4.4 Data Link/Medium Access Control layer
  • 6.4.5 Physical layer
  • 6.5 Security in Architectures and Standards
  • 6.5.1 IETF
  • 6.5.2 3GPP and low-power Wide Area Networks
  • 6.6 Security for a Safe IoT
  • 6.6.1 Safety in industrial automation and robotics
  • 6.6.2 Safety in automotive systems
  • 6.6.3 Safety in Smart Cities
  • 6.7 Privacy in IoT
  • 6.8 Future Developments in Security
  • 7 Architecture and State-of-the-Art
  • 7.1 Introduction
  • 7.2 ITU-T
  • 7.3 IETF
  • 7.3.1 Introduction
  • 7.3.2 IETF IoT-related Working Groups
  • 7.3.3 IETF fragments of an architecture
  • 7.4 OMA
  • 7.5 IoT-A and IIRA
  • 7.6 RAMI 4.0
  • 7.7 W3C
  • 7.8 OGC
  • 7.9 GS1 Architecture and Technologies
  • 7.9.1 GS1 Identify
  • 7.9.2 GS1 Capture
  • 7.9.3 GS1 Share
  • 7.9.4 EPCIS architecture and technologies
  • 7.10 Other Relevant State-of-the-Art
  • 7.10.1 oneM2M
  • 7.10.2 OCF
  • 7.10.3 IEEE
  • 7.10.4 IEC/ISO: ISO/IEC JTC 1/WG 10/SC 41
  • 7.10.5 AIOTI
  • 7.10.6 NIST CPS
  • 7.11 Conclusions
  • 8 Architecture Reference Model
  • 8.1 Introduction
  • 8.2 Reference Model and Architecture
  • 8.3 IoT Reference Model
  • 8.3.1 IoT Domain Model
  • 8.3.1.1 Model notation and semantics
  • 8.3.1.2 Main concepts
  • 8.3.1.3 Further considerations
  • 8.3.2 Information model
  • 8.3.3 Functional model
  • 8.3.3.1 Device Functional Group
  • 8.3.3.2 Communication Functional Group
  • 8.3.3.3 IoT Service Functional Group
  • 8.3.3.4 Virtual Entity Functional Group
  • 8.3.3.5 IoT Service Organization Functional Group
  • 8.3.3.6 IoT Process Management Functional Group
  • 8.3.3.7 Management Functional Group
  • 8.3.3.8 Security Functional Group
  • 8.3.3.9 Application Functional Group
  • 8.3.3.10 Modular IoT functions
  • 8.3.4 Communication model
  • 8.3.5 Safety, privacy, trust, security model
  • 8.3.5.1 Safety
  • 8.3.5.2 Privacy
  • 8.3.5.3 Trust
  • 8.3.5.4 Security
  • 8.4 IoT Reference Architecture
  • 8.5 Functional View
  • 8.5.1 Device and Application Functional Group
  • 8.5.2 Communication Functional Group
  • 8.5.3 IoT Service Functional Group
  • 8.5.4 Virtual Entity Functional Group
  • 8.5.5 IoT Process Management Functional Group
  • 8.5.6 Service Organization Functional Group
  • 8.5.7 Security Functional Group
  • 8.5.8 Management Functional Group
  • 8.6 Information View
  • 8.6.1 Information description
  • 8.6.2 Information flow and lifecycle
  • 8.6.3 Information handling
  • 8.7 Deployment and Operational View
  • 8.8 Other Relevant Architectural Views
  • 8.9 Other Reference Models and Architectures
  • 8.9.1 Industrial Internet Reference Architecture
  • 8.9.1.1 IIRA Usage Viewpoint
  • 8.9.1.2 IIRA Functional Viewpoint
  • 8.9.1.3 IIRA Implementation viewpoint
  • 8.10 Best Practices
  • 8.11 Conclusions
  • 9 Designing the Internet of Things for the Real World
  • 9.1 Introduction
  • 9.2 Technical Design Constraints – Hardware Is Popular Again
  • 9.2.1 Devices and networks
  • 9.2.1.1 Functional requirements
  • 9.2.1.2 Sensing and communications field
  • 9.2.1.3 Programming and embedded intelligence
  • 9.2.1.4 Power
  • 9.2.1.5 Gateway
  • 9.2.1.6 Nonfunctional requirements
  • 9.2.1.7 Financial cost
  • 9.3 Data Representation and Visualization
  • 9.4 Interaction and Remote Control
  • Part 3 IoT Use Cases
  • 10 Asset Management
  • 10.1 Introduction
  • 10.2 Expected Benefits
  • 10.3 e-Maintenance in the IoT Era
  • 10.4 Hazardous Goods Management in the IoT Era
  • 10.5 Conclusions
  • 11 Industrial Automation
  • 11.1 SOA-Based Device Integration
  • 11.2 SOCRADES: Realizing the Enterprise Integrated Web of Things
  • 11.3 IMC-AESOP: From the Web of Things to the Cloud of Things
  • 11.4 Conclusions
  • 12 Smart Grid
  • 12.1 Introduction
  • 12.2 Smart Metering
  • 12.3 Smart House
  • 12.4 Smart Grid City
  • 12.5 Conclusions
  • 13 Commercial Building Automation
  • 13.1 Introduction
  • 13.2 Case Study: Phase One – Commercial Building Automation Today
  • 13.2.1 Background
  • 13.2.2 Technology overview
  • 13.2.3 Value chain
  • 13.3 Case Study: Phase Two – Commercial Building Automation in the Future
  • 13.3.1 Evolution of commercial building automation
  • 13.3.2 Background
  • 13.3.3 Technology overview
  • 13.3.4 Evolved value chain for commercial building automation
  • 14 Smart Cities
  • 14.1 Introduction – What Is a Smart City?
  • 14.2 Smart Cities – A Technical Perspective
  • 14.3 IoT Data Supply Chains
  • 14.4 IoT Data and Context Management in Smart Cities
  • 14.5 ETSI ISC Context Information Management
  • 14.6 Smart Cities – A Reference Architecture
  • 14.7 Smart Cities – Smart Parking
  • 15 Participatory Sensing
  • 15.1 Introduction
  • 15.2 Roles, Actors, Engagement
  • 15.2.1 Collective design and investigation
  • 15.2.2 Public contribution
  • 15.2.3 Personal use and reflection
  • 15.3 Participatory Sensing Process
  • 15.4 Technology Overview
  • 15.5 An Early Scenario
  • 15.6 Recent Trends
  • 15.6.1 Citizen journalism
  • 15.6.2 Passive participation
  • 15.6.3 Social Sensing
  • 15.7 A Modern Example
  • 15.8 Conclusions
  • 16 Autonomous Vehicles and Systems of Cyber-Physical Systems
  • 16.1 Introduction
  • 16.2 Autonomous Cars
  • 16.2.1 A very brief history of autonomous cars
  • 16.2.2 Enabling technologies
  • 16.2.3 Regulation, governance, and ethics
  • 16.2.4 Other autonomous passenger vehicles
  • 16.3 Other Autonomous Systems
  • 16.3.1 Autonomous rail
  • 16.3.2 Unmanned aerial systems
  • 16.3.3 Unmanned Autonomous Underwater Vehicles and Systems
  • 16.4 Intelligent Infrastructure
  • 16.5 Convergence and Systems of Cyber-Physical Systems
  • 16.6 Cyber-Physical Systems Challenges and Opportunities
  • 17 Logistics
  • 17.1 Introduction
  • 17.2 Roles and Actors
  • 17.3 Technology Overview
  • 17.3.1 Identification of the Things
  • 17.3.2 Main technologies
  • 17.4 Example Scenario – Food Transport
  • 17.5 Conclusions
  • 18 Conclusions and Looking Ahead
  • A ETSI M2M
  • A.1 Introduction
  • A.1.1 ETSI M2M high-level architecture
  • A.1.2 ETSI M2M Service Capabilities
  • A.1.3 ETSI M2M interfaces
  • A.1.4 ETSI M2M resource management
  • Abbreviations
  • Bibliography
  • Index
  • Back Cover
Show More

Additional information

Veldu vöru

Rafbók til eignar

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð