ISBN-13: 9783030901608 / Angielski / Miękka / 2023 / 451 str.
ISBN-13: 9783030901608 / Angielski / Miękka / 2023 / 451 str.
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. As with the second edition, it is organized into six main parts: an IoT reference model; fog computing and the drivers; IoT management and applications; smart services in IoT; IoT standards; and case studies. This edition’s features include overhaul of the IoT Protocols (Chapter 5) to include an expanded treatment of low-power wide area networks including narrow band IoT (NB-IoT) protocol, updated IoT platforms and capabilities (Chapter 7) to include comparison of commercially available platforms (e.g. AWS IoT Platform, Google Cloud IoT Platform, Microsoft Azure IoT Platform, and PTC ThinkWorx), updated security (Chapter 8) to include approaches for securing IoT devices with examples of IoT devices used in security attacks and associated solutions including MUD and DICE, and finally new Appendix B to include six IoT project detailed for students.
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. As with the second edition, it is organized into six main parts: an IoT reference model; fog computing and the drivers; IoT management and applications; smart services in IoT; IoT standards; and case studies. This edition’s features include overhaul of the IoT Protocols (Chapter 5) to include an expanded treatment of low-power wide area networks including narrow band IoT (NB-IoT) protocol, updated IoT platforms and capabilities (Chapter 7) to include comparison of commercially available platforms (e.g. AWS IoT Platform, Google Cloud IoT Platform, Microsoft Azure IoT Platform, and PTC ThinkWorx), updated security (Chapter 8) to include approaches for securing IoT devices with examples of IoT devices used in security attacks and associated solutions including MUD and DICE, and finally new Appendix B to include six IoT project detailed for students.