ISBN-13: 9781119701255 / Angielski / Twarda / 2020 / 288 str.
ISBN-13: 9781119701255 / Angielski / Twarda / 2020 / 288 str.
About the Authors xiiiPreface xvAcknowledgments xix1 Internet of Things (IoT) Fundamentals 11.1 Introduction 11.2 Evolution of IoT Concept 21.3 IoT Vision 31.4 IoT Definition 51.5 IoT Basic Characteristics 61.6 IoT Distinction 71.6.1 IoT Versus Embedded Systems 71.6.2 IoT Versus M2M 71.6.3 IoT Versus CPS 71.6.4 IoT Versus WSN 81.6.5 IoT Versus WoT 81.7 IoT General Enablers 91.7.1 Identification and Sensing Technologies 101.7.2 Wireless Communication and Networking 111.7.3 Aggregation Standardization 141.7.4 Augmented Intelligence 141.7.5 Augmented Behavior 151.8 IoT Architectures 161.8.1 Three-layer IoT Architecture 171.8.1.1 Perception Layer 171.8.1.2 Network Layer 181.8.1.3 Application Layer 181.8.2 Five-Layer IoT Architecture 191.8.2.1 Object (Perception) Layer 191.8.2.2 Object Abstraction (Network) Layer 191.8.2.3 Service Management (Middleware) Layer 191.8.2.4 Application Layer 191.8.2.5 Business Layer 191.8.3 Six-layer Architecture 201.8.3.1 Focus Layer 211.8.3.2 Cognizance Layer 211.8.3.3 Transmission Layer 211.8.3.4 Application Layer 211.8.3.5 Infrastructure Layer 211.8.3.6 Competence Business Layer 211.8.4 Seven-layer Architecture 211.8.4.1 Layer 1: Things Layer 211.8.4.2 Layer 2: Connectivity 211.8.4.3 Layer 3: Edge/Fog Computing 221.8.4.4 Layer 4: Data Accumulation 231.8.4.5 Layer 5: Data Abstraction Layer 231.8.4.6 Level 6: Application Layer 231.8.4.7 Layer 7: Collaboration and Processes 231.9 Advantages and Disadvantages of IoT 23Review Questions 23References 252 IoT Building Blocks - Hardware and Software 292.1 IoT Building Blocks 292.2 The Smart Things 292.2.1 Smart Thing Sensor 302.2.2 Smart Thing Communicator 312.2.3 Smart Thing Actuator 312.2.4 Smart Thing Controller 322.2.4.1 Microcontroller (MCU) 322.2.4.2 Development Boards 322.2.4.3 Packet Tracer and MCUs 332.2.5 Smart Thing Capabilities 362.3 The IoT Gateway 382.4 Network Infrastructure 392.5 IoT Cloud 392.5.1 Virtual Resource Pool 392.5.2 Application Server 392.5.3 Database Servers 402.5.4 Load-balancing Servers 412.6 IoT Analytics 412.6.1 IoT Analytics - Tools and Techniques 422.6.2 IoT Analytics Life Cycle 432.7 IoT Applications 43Review Questions 43References 453 Sensing Principles and Wireless Sensor Network 493.1 Sensor Fundamentals 493.2 Sensor Classification 513.2.1 Simple (Direct) Sensor Versus Complex Sensor 513.2.2 Active Sensors Versus Passive Sensors 513.2.3 Contact Sensors Versus Noncontact Sensors 523.2.4 Absolute Sensors and Relative Sensors 523.2.5 Digital Sensors Versus Analog Sensors (Based on Output) 523.2.6 Scalar Sensor Versus Vector Sensors (Based on Data Types) 523.3 Anatomy of Sensors 523.4 Physical Principles of Sensing 533.4.1 Capacitance 533.4.1.1 Examples of Capacitive Sensors 553.4.2 Magnetism and Induction 573.4.2.1 Magnetic Sensing Examples 593.4.3 Electric Resistance and Resistivity 603.4.3.1 Resistive Sensor Applications 613.4.4 Piezoelectric Effect 613.5 Use of Basic Sensing Principles in RFID Technology 613.6 Actuators 623.7 Wireless Sensor Networks (WSNs) 633.7.1 WSN Architecture 633.7.2 Types of WSNs 643.7.3 General Characteristics of WSNs 643.7.4 Protocol Stack of WSNs 653.7.4.1 Physical Layer 653.7.4.2 Data Link Layer (DLL) 663.7.4.3 Network Layer 683.7.4.4 Transport Layer 683.7.4.5 Application Layer 693.7.4.6 Cross-layer WSN Protocols 693.7.5 WSN Operating Systems 693.7.5.1 WSN OS Design Issues 71Review Questions 72References 724 IoT Gateway 754.1 The IoT Gateway 754.2 Sensing Domain and IoT Gateways 774.3 The Architecture of IoT Gateway 794.3.1 Hardware Layer of IoT Gateway 794.3.2 OS Layer of IoT Gateway 804.3.3 Hardware Abstraction Layer 804.3.4 Data Forwarding Layer 804.3.5 Service Abstraction Layer 814.3.6 Manageability Layer 814.3.7 Security Layer 814.3.8 Application Layer 814.4 Selection of IoT Gateway 814.4.1 Nature of IoT System Architecture 814.4.2 Multiple Network Connectivity Support 824.4.3 Data Storage Capacity 824.4.4 Development Environment 824.4.5 Robust Security Mechanism 824.4.6 External Hardware Watchdog Timer 834.4.7 Time Synchronization 834.4.8 Firmware Update 834.4.9 LED Indication and Remote Reboot 834.4.10 Support for Legacy Equipment 834.4.11 Standard Protocol Support 834.4.12 Gateway Certification 834.4.13 Control of Low Power Footprint 844.4.14 Support for Edge Computing 844.5 IoT Gateways and Edge Computing 844.5.1 Benefits of Edge Computing 844.5.2 Use Cases of Edge Computing 854.5.2.1 Smart Home 854.5.2.2 Cooperative Safety Smart Vehicles 864.5.2.3 Provisioning of Infotainment Services for Smart Vehicles 864.5.2.4 Online Shopping Service 864.5.2.5 Healthcare and Collaborative Edge 864.5.2.6 Video Monitoring and Analysis 874.5.2.7 Smart City 874.5.2.8 Security Surveillance 874.5.2.9 Retail Advertising 874.5.3 Challenges of Edge Computing-based IoT Systems 874.5.3.1 System Integration 884.5.3.2 Resource Management 884.5.3.3 Security and Privacy 884.5.3.4 Heterogenous Communication 884.5.3.5 Data Analysis Support for Smart Systems 884.6 IoT Gateway Providers 89Review Questions 89References 905 IoT Protocol Stack 935.1 IoT Protocol Stack 935.2 IoT Protocols 955.2.1 Infrastructure Protocols 955.2.1.1 EPCglobal 955.2.1.2 Z-wave 965.2.1.3 Long-term Evolution - Advanced (LTE-A) 975.2.1.4 Bluetooth Low Energy (BLE) 975.2.1.5 IEEE 802.15.4 975.2.1.6 IEEE 802.11ah 985.2.1.7 ZigBee 1005.2.1.8 6LoWPAN 1025.2.1.9 Routing Protocol for Low-Power and Lossy Networks (RPL) 1025.2.2 Service Discovery Protocols 1045.2.2.1 Multicast Domain Name System (mDNS) 1045.2.2.2 DNS Service Discovery (DNS-SD) 1045.2.3 Application Layer Protocols 1055.2.3.1 Data Distribution Service (DDS) 1055.2.3.2 Message Queue Telemetry Transport (MQTT) 1055.2.3.3 Constrained Application Protocol (CoAP) 1115.2.3.4 Advanced Message Queuing Protocol (AMQP) 1165.2.3.5 eXtensible Messaging and Presence Protocol (XMPP) 119Review Questions 123References 1246 IoT Cloud and Fog Computing 1276.1 IoT Cloud 1276.1.1 Cloud Computing for IoT 1296.1.2 IoT Cloud Architecture 1296.1.2.1 Virtual Resource Pool 1306.1.2.2 Application Server 1306.1.2.3 Database Servers 1316.1.2.4 Load-balancing Servers 1316.1.3 Application Domains of IoT Cloud Platforms 1346.2 Fog Computing for IoT 1356.2.1 Difference from Related Computing Paradigms 1366.2.1.1 Edge Computing 1366.2.1.2 Mobile Edge Computing (MEC) 1366.2.2 Architecture of Fog Computing 1376.2.2.1 Physical and Virtualization Layer 1376.2.2.2 Monitoring Layer 1376.2.2.3 Preprocessing Layer 1376.2.2.4 Temporary Storage Layer 1376.2.2.5 Security Layer 1376.2.2.6 Transport Layer 1396.2.3 Fog Deployment Models 1396.2.4 Fog Service Models 1406.3 Case Study - Vehicles with Fog Computing 1406.3.1 VANETs and Fog Computing 1406.3.2 Dynamic Traffic Light Signal Management 1416.3.3 Parking System 1426.3.4 Content Distribution 1436.3.5 Decision Support System 143Review Questions 143References 1447 IoT Applications 1477.1 Application Domains of IoT 1477.2 IoT and Smart Home 1477.2.1 IoT-based Smart Home Framework 1487.3 IoT and Healthcare 1507.4 IoT and Smart Mobility 1537.4.1 Car Parking System 1567.5 IoT and Agriculture 1597.5.1 Major Instances of Crop Growth and IoT 1597.5.2 IoT Architecture of Smart Agriculture 1607.6 Smart Grid 1627.7 IoT-based Smart Cities 1647.8 IoT and Smart Education 1677.9 Industrial IoT 168Review Questions 168References 1708 IoT Security 1738.1 IoT Systems and Security Constraints 1738.1.1 IoT Security Constraints Based on Hardware Limitations 1758.1.2 IoT Security Constraints Based on Software Limitations 1768.1.3 IoT Security Constraints Based on Communication Limitations 1768.2 IoT Security Requirements 1768.2.1 Information-level Security Requirements 1768.2.2 Access-level Security Requirements 1778.2.3 Functional Security Requirements 1778.3 Security Challenges 1778.4 Taxonomy of IoT Security Threats/Attacks 1788.4.1 IoT Security Attacks Based on Device Category 1788.4.2 Attacks Based on Access Level 1788.4.3 Attacks Based on Attacker's Location 1788.4.4 Attacks Based on Attack Strategy 1788.4.5 Attacks Based on Information Damage Level 1808.4.6 Host-based IoT Attacks 1808.4.7 Protocol-based Attacks 1808.5 IoT Architecture and IoT Security 1808.5.1 Perception Layer Security 1808.5.2 Network Layer Security 1838.5.3 IoT Application Layer Security 1858.5.3.1 Security Threats at Support Layer of IoT Applications 1858.5.3.2 Security Threats at Service Layer of IoT Applications 1858.6 Multilayer Security Attacks 1868.7 IoT Application Scenarios and IoT Security 1868.7.1 Smart Home Security 1868.7.2 Smart Healthcare Security 1878.7.3 Smart Vehicle Security 1898.7.4 Smart City Security/Privacy Concerns 190Review Questions 190References 1929 Social IoT 1959.1 Smart Things to Social Things 1959.2 The Epitome of SIoT 1969.3 Smart Thing Relationships in SIoT 1979.4 SIoT Architecture 1989.4.1 SIoT Server 1989.4.1.1 The Network Layer of SIoT Server 1999.4.1.2 The Application Layer of SIoT Server 1999.4.1.3 The Interface Sublayer 2009.4.2 The SIoT Gateway and Social Things 2009.5 Features of SIoT System 2009.6 Social Internet of Vehicles (SIoV) - An Example Use Case of SIoT 2019.6.1 Reference Architecture of VANETs 2019.6.2 Reference Architecture of IoV 2039.6.2.1 Differences in Communication Standards 2039.6.3 Reference Architecture of SIoV 2059.6.3.1 Vehicle-Object Perception Layer (VOPL) 2059.6.3.2 The IoV Gateway Layer 2089.6.3.3 The Fog Layer 2099.6.3.4 The Vehicular Cloud Layer 2099.7 SIoV Application Services 209Review Questions 210References 21010 Packet Tracer and IoT 21310.1 IoT and Packet Tracer 21310.2 Packet Tracer Programming Environment 21410.3 Visual (Blockly) Programming Language 21610.3.1 Hello World Program 21710.4 Simple Smart Light Project 21910.4.1 Adding Devices to Workspace 22210.4.2 Connecting Devices 22410.4.3 Using Program Blocks and Pin Access 227References 23411 IoT Projects in Packet Tracer 23511.1 IoT Projects in Packet Tracer 23511.2 Smart Things Directly Connected with Gateways 23511.3 Smart Things and Sensors Directly Connected with MCUs (Without Gateways) 23711.3.1 Adding Devices to Workspace 24011.3.2 Connecting Devices Together 24111.3.3 Blockly Programming for Smart Room 242Review Questions 255Index 259
MUHAMMAD AZHAR IQBAL, PHD, is Lecturer (Assistant Professor) at the Southwest Jiaotong University in China. He obtained his PhD in Communication and Information Systems from Huazhong University of Science and Technology, China, in 2012.SAJJAD HUSSAIN, PHD, is Senior Lecturer (Associate Professor) at the University of Glasgow in the United Kingdom. He received his doctorate in Signal Processing and Communications from the University of Rennes 1 in France in 2009.HUANLAI XING, PHD, is Associate Professor at the Southwest Jiaotong University in China. He received his PhD in Computer Science at the University of Nottingham in the United Kingdom in 2013.MUHAMMAD ALI IMRAN, PHD, is Professor of Communication Systems in James Watt School of Engineering at the University of Glasgow in the United Kingdom and Dean University of Glasgow, UESTC.
1997-2024 DolnySlask.com Agencja Internetowa