Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 33000000002624 | TK5105.8857 P37 2017 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects.
This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".
Author Notes
Dominique Paret is Engineer ESIEE / DEA of physics and was responsible for the technical support of an international leader of electronic components for many years. Professor in numerous engineering schools in France and abroad, he runs a company of consultants/technical experts.
Jean-Paul Huon is Engineer IMERIR + CNAM of Robotic Artificial Intelligence and has previously worked in many sectors (telecom, electrical vehicle, retail, mobile payments, public transport, French Post Office and DGA (Dlgation Gnrale pour l'Armement). He is the co-founder of the "Business connected group" Z#BRE which he runs by exploiting the economic potential of the Internet of Things.
Table of Contents
Foreword | p. xi |
Preface | p. xiii |
Acknowledgements | p. xv |
Preamble | p. xvii |
Part 1 Introduction - The Buzz about IoT and IoE | p. 1 |
Chapter 1 Introduction | p. 3 |
1.1 Definition of communicating- or connected Things | p. 3 |
1.1.1 Connected Things - Communicating Things | p. 3 |
1.1.2 Definition of the IoT | p. 4 |
1.1.3 Internet of x | p. 5 |
Chapter 2 The (Overly) Vast World of IoT | p. 9 |
2.1 2011-2016: the craze for the term "Connected Thing" | p. 9 |
2.1.1 The catch-all | p. 9 |
2.1.2 Fashion, buzz and "bubble" | p. 10 |
2.1.3 "Hype" cycle for innovations | p. 11 |
2.2 The true goal of this book | p. 14 |
Chapter 3 Why a Connectable Thing? | p. 15 |
3.1 Examples of connectable things | p. 15 |
3.1.1 Home care for the elderly | p. 16 |
3.1.2 In the automotive industry | p. 19 |
Part 2 Constraints Surrounding an IoT Project | p. 21 |
Chapter 4 Aspects to be Taken into Consideration | p. 23 |
4.1 Aspects pertaining to the concrete realization of Connected Things | p. 23 |
4.1.1 Financial and marketing aspects | p. 24 |
4.1.2 Technical and industrial aspects | p. 24 |
4.1.3 Regulatory and normative aspects | p. 24 |
4.1.4 Security aspects | p. 24 |
4.1.5 Cost aspects | p. 24 |
Chapter 5 Financial and Marketing Aspects | p. 27 |
5.1 Economic aspects | p. 27 |
5.1.1 Saleable / buyable | p. 27 |
5.2 Ergonomic aspects | p. 29 |
5.2.1 Mechanical form and design vs ergonomics | p. 29 |
Chapter 6 Technical and Industrial Aspects | p. 31 |
6.1 Technical aspects | p. 31 |
6.1.1 Life cycle of a new product | p. 31 |
6.1.2 Techno-economic feasibility | p. 32 |
6.1.3 Design | p. 32 |
6.1.4 Industrialization, manufacturing process and quality assurance | p. 32 |
6.2 Energy aspects | p. 32 |
6.2.1 Power supply to the Thing | p. 33 |
6.3 Industrial aspects | p. 39 |
Chapter 7 Regulatory and Normative Aspects | p. 41 |
7.1 Regulatory aspects and recommendations | p. 41 |
7.1.1 Radiofrequeney regulations | p. 42 |
7.2 Health-related recommendations | p. 43 |
7.2.1 Exposure of the human body to electromagnetic fields | p. 44 |
7.2.2 Specific Absorption Rate (SAR) | p. 44 |
7.3 Societal regulations and individual freedoms (privacy) | p. 45 |
7.3.1 The various data needing to be protected | p. 45 |
7.3.2 Loi Informatique et Libertés | p. 45 |
7.3.3 Mandate 436, PIA and RFID and IoT applications | p. 46 |
7.3.4 GDPR-General Data Protection Regulation | p. 49 |
7.3.5 Privacy by design | p. 51 |
7.4 Environmental regulations and recycling | p. 53 |
7.4.1 Electronic waste treatment | p. 53 |
7.4.2 Regulation and organization of the chain | p. 54 |
7.4.3 Labeling of electrical and electronic equipment | p. 54 |
7.5 Normative aspects | p. 55 |
7.5.1 ISO/AFNOR | p. 55 |
7.5.2 IEEE | p. 56 |
7.5.3 ETSI | p. 56 |
Chapter 8 Security Aspects | p. 59 |
8.1 Security aspects | p. 59 |
8.1.1 The weak links | p. 60 |
8.1.2 Possible solutions | p. 62 |
8.1.3 Definition and choice of security target | p. 63 |
8.1.4 Concepts of security levels applied in IoT | p. 64 |
8.1.5 True security - the "Secure Element" | p. 67 |
8.1.6 Cryptography | p. 70 |
8.1.7 Symmetric and asymmetric encryption | p. 71 |
8.1.8 Consumer Things, IoT, security ... and the Cloud | p. 75 |
8.2 Judging the quality of security | p. 80 |
8.3 Some thoughts about security, privacy and IoT | p. 81 |
8.4 Vulnerabilities and attacks in the IoT chain | p. 82 |
8.4.1 Attacks on the software layer | p. 83 |
8.4.2 Attacks on the board or Thing | p. 84 |
8.4.3 Attacks on the integrated circuits | p. 84 |
8.4.4 Security standards | p. 85 |
Part 3 Overall Architecture of the IoT Chain | p. 87 |
Chapter 9 Communication Models in IoT | p. 89 |
9.1 Communication models in IoT | p. 89 |
9.1.1 OSI model | p. 89 |
9.1.2 TCP/IP model | p. 92 |
9.1.3 By way of conclusion | p. 98 |
Chapter 10 Overall Architecture of an IoT System | p. 101 |
10.1 Overall architecture of a CT and IoT solution | p. 101 |
10.1.1 Description of the complete chain | p. 102 |
10.2 From a more technological point of view | p. 102 |
10.2.1 Architecture and overview of an IoT chain | p. 102 |
10.2.2 The "base station/gateway" | p. 106 |
10.2.3 The "Cloud" zone | p. 109 |
10.2.4 The "User" zone | p. 110 |
10.3 The very numerous protocols involved | p. 113 |
Part 4 Detailed Description of the IoT Chain | p. 117 |
Part 4A From the User (The Outside World) to the Thing | p. 119 |
Chapter 11 From the Outside World to the Thing | p. 121 |
11.1 Connection of the Thing to the outside world | p. 121 |
11.1.1 Using sensors | p. 121 |
11.1.2 Using wired connections | p. 122 |
11.1.3 Using RF links | p. 122 |
11.1.4 Very Short Range ( | p. 122 |
11.1.5 Short range SR Wide band (tens of meters) | p. 124 |
Chapter 12 The Secure Connected Thing | p. 127 |
12.1 Physical constitution of the Thing | p. 127 |
12.1.1 Sensors | p. 127 |
12.1.2 Local intelligence - microcontroller | p. 128 |
12.1.3 Security (SE) | p. 128 |
Part 4B From the Thing to the Base Station | p. 131 |
Chapter 13 Means of Communication to Access a Base Station | p. 133 |
13.1 Possible network connectivity technologies | p. 133 |
13.1.1 Local or ultra-local non-operated RF networks | p. 135 |
13.1.2 Extended-deployment operated RF networks | p. 136 |
13.1.3 Is there space for all these technologies? | p. 136 |
13.2 Medium-range MR Wide-band (hundreds of meters) | p. 136 |
13.2.1 Wi-Fi | p. 137 |
13.3 Long-range (LR - tens of kilometers) | p. 138 |
13.3.1 NB, UNB, WB, UWB, FHSS, DSSS and RF regulations | p. 138 |
13.3.2 Regulators and regulations | p. 140 |
13.3.3 RF bases | p. 146 |
13.4 LTN - Low-Throughput Network | p. 152 |
13.4.1 Long Range LR - LTN | p. 153 |
13.4.2 LR LTN in (U)NB - SIGFOX | p. 156 |
13.4.3 LR LTN in DSSS (spectrum spreading) - LoRa, from Semtech | p. 167 |
13.4.4 A discussion of spectrum spreading - SS | p. 169 |
13.4.5 LR WB | p. 192 |
13.4.6 Operated LR WB networks | p. 196 |
Part 4C From the Base Station to the Server | p. 203 |
Chapter 14 Network Access Layer - IP | p. 205 |
14.1 IPv4 | p. 205 |
14.1.1 Operation | p. 206 |
14.1.2 Services provided | p. 206 |
14.1.3 Reliability | p. 206 |
14.2 IPv6 | p. 207 |
14.2.1 Differences between IPv6 and IPv4 | p. 207 |
14.2.2 Problems of privacy and/or anonymity? | p. 209 |
14.3 6LoWPAN | p. 209 |
14.3.1 Description of the technology | p. 210 |
14.3.2 Integration of an IPv6 packet into an IEEE 802.15.4 frame | p. 210 |
14.3.3 Autoconfiguration of an IP address | p. 211 |
14.3.4 Network supervision and management | p. 211 |
14.3.5 Constraints on "upper-layer" applications | p. 211 |
14.3.6 Security | p. 212 |
14.3.7 Routing | p. 212 |
Chapter 15 The Server | p. 215 |
15.1 Conventional functions of a server in IoT | p. 216 |
Chapter 16 Transport and Messaging Protocols | p. 219 |
16.1 Transport | p. 219 |
16.1.1 Operation | p. 220 |
16.1.2 Structure of a TCP segment | p. 220 |
16.2 "IoT messaging" technologies | p. 221 |
16.2.1 Main protocol parameters | p. 221 |
16.3 Protocols | p. 225 |
16.4 HTTP-HyperText Transfer Protocol | p. 226 |
16.5 HTTP/2 | p. 227 |
16.6 MQTT - Message Queuing Telemetry Transport | p. 227 |
16.6.1 Security in MQTT | p. 229 |
16.7 CoAP- Constrained Application Protocol | p. 229 |
16.8 XMPP | p. 230 |
16.9 DDS - Data Distribution Service | p. 231 |
16.10 AMQP - Advanced Message Queuing Protocol | p. 232 |
16.11 SMQ | p. 233 |
16.12 JMS - Java Messaging Service | p. 233 |
16.13 Other protocols | p. 234 |
16.14 The broker | p. 234 |
16.14.1 Examples of possibilities | p. 235 |
16.15 Programming languages | p. 236 |
16.16 Operating systems | p. 236 |
Part 4D From the Cloud Server to the Various Users | p. 237 |
Chapter 17 Cloud and Fog Computing | p. 239 |
17.1 Cloud computing? | p. 239 |
17.1.1 What is its mode of operation? | p. 240 |
17.1.2 Advantages and benefits in IoT applications | p. 240 |
17.1.3 Types of Cloud computing | p. 241 |
17.1.4 Cloud products and services | p. 241 |
17.2 Example: the PaaS platform AWS IoT | p. 242 |
17.3 How security is managed | p. 244 |
17.4 Fog computing? | p. 245 |
17.5 Big data | p. 246 |
17.6 Natural interfaces | p. 247 |
Part 5 Concrete Realization of an IoT Solution Examples and Costs | p. 249 |
Chapter 18 Examples of the Concrete Realization of Connected Things | p. 251 |
18.1 Subject/application taken as an example | p. 251 |
18.1.1 Architecture of the product: a communicating physical Thing | p. 253 |
18.1.2 Mandatory steps in creating the Thing | p. 255 |
Chapter 19 Cost Aspects | p. 261 |
19.1 CAPEX and OPEX are in the same boat | p. 261 |
19.1.1 Capex | p. 262 |
19.1.2 Opex | p. 273 |
19.1.3 Conclusions | p. 275 |
19.1.4 Very important conclusions | p. 276 |
Conclusion | p. 279 |
Bibliography | p. 281 |
Index | p. 285 |