Skip to:Content
|
Bottom
Cover image for Secure Connected Objects
Title:
Secure Connected Objects
Personal Author:
Physical Description:
xviii, 290 pages : illustrations ; 24cm.
ISBN:
9781786300591
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
33000000002624 TK5105.8857 P37 2017 Open Access Book Book
Searching...

On Order

Summary

Summary

In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects.

This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".


Author Notes

Dominique Paret is Engineer ESIEE / DEA of physics and was responsible for the technical support of an international leader of electronic components for many years. Professor in numerous engineering schools in France and abroad, he runs a company of consultants/technical experts.
Jean-Paul Huon is Engineer IMERIR + CNAM of Robotic Artificial Intelligence and has previously worked in many sectors (telecom, electrical vehicle, retail, mobile payments, public transport, French Post Office and DGA (Dlgation Gnrale pour l'Armement). He is the co-founder of the "Business connected group" Z#BRE which he runs by exploiting the economic potential of the Internet of Things.


Table of Contents

Forewordp. xi
Prefacep. xiii
Acknowledgementsp. xv
Preamblep. xvii
Part 1 Introduction - The Buzz about IoT and IoEp. 1
Chapter 1 Introductionp. 3
1.1 Definition of communicating- or connected Thingsp. 3
1.1.1 Connected Things - Communicating Thingsp. 3
1.1.2 Definition of the IoTp. 4
1.1.3 Internet of xp. 5
Chapter 2 The (Overly) Vast World of IoTp. 9
2.1 2011-2016: the craze for the term "Connected Thing"p. 9
2.1.1 The catch-allp. 9
2.1.2 Fashion, buzz and "bubble"p. 10
2.1.3 "Hype" cycle for innovationsp. 11
2.2 The true goal of this bookp. 14
Chapter 3 Why a Connectable Thing?p. 15
3.1 Examples of connectable thingsp. 15
3.1.1 Home care for the elderlyp. 16
3.1.2 In the automotive industryp. 19
Part 2 Constraints Surrounding an IoT Projectp. 21
Chapter 4 Aspects to be Taken into Considerationp. 23
4.1 Aspects pertaining to the concrete realization of Connected Thingsp. 23
4.1.1 Financial and marketing aspectsp. 24
4.1.2 Technical and industrial aspectsp. 24
4.1.3 Regulatory and normative aspectsp. 24
4.1.4 Security aspectsp. 24
4.1.5 Cost aspectsp. 24
Chapter 5 Financial and Marketing Aspectsp. 27
5.1 Economic aspectsp. 27
5.1.1 Saleable / buyablep. 27
5.2 Ergonomic aspectsp. 29
5.2.1 Mechanical form and design vs ergonomicsp. 29
Chapter 6 Technical and Industrial Aspectsp. 31
6.1 Technical aspectsp. 31
6.1.1 Life cycle of a new productp. 31
6.1.2 Techno-economic feasibilityp. 32
6.1.3 Designp. 32
6.1.4 Industrialization, manufacturing process and quality assurancep. 32
6.2 Energy aspectsp. 32
6.2.1 Power supply to the Thingp. 33
6.3 Industrial aspectsp. 39
Chapter 7 Regulatory and Normative Aspectsp. 41
7.1 Regulatory aspects and recommendationsp. 41
7.1.1 Radiofrequeney regulationsp. 42
7.2 Health-related recommendationsp. 43
7.2.1 Exposure of the human body to electromagnetic fieldsp. 44
7.2.2 Specific Absorption Rate (SAR)p. 44
7.3 Societal regulations and individual freedoms (privacy)p. 45
7.3.1 The various data needing to be protectedp. 45
7.3.2 Loi Informatique et Libertésp. 45
7.3.3 Mandate 436, PIA and RFID and IoT applicationsp. 46
7.3.4 GDPR-General Data Protection Regulationp. 49
7.3.5 Privacy by designp. 51
7.4 Environmental regulations and recyclingp. 53
7.4.1 Electronic waste treatmentp. 53
7.4.2 Regulation and organization of the chainp. 54
7.4.3 Labeling of electrical and electronic equipmentp. 54
7.5 Normative aspectsp. 55
7.5.1 ISO/AFNORp. 55
7.5.2 IEEEp. 56
7.5.3 ETSIp. 56
Chapter 8 Security Aspectsp. 59
8.1 Security aspectsp. 59
8.1.1 The weak linksp. 60
8.1.2 Possible solutionsp. 62
8.1.3 Definition and choice of security targetp. 63
8.1.4 Concepts of security levels applied in IoTp. 64
8.1.5 True security - the "Secure Element"p. 67
8.1.6 Cryptographyp. 70
8.1.7 Symmetric and asymmetric encryptionp. 71
8.1.8 Consumer Things, IoT, security ... and the Cloudp. 75
8.2 Judging the quality of securityp. 80
8.3 Some thoughts about security, privacy and IoTp. 81
8.4 Vulnerabilities and attacks in the IoT chainp. 82
8.4.1 Attacks on the software layerp. 83
8.4.2 Attacks on the board or Thingp. 84
8.4.3 Attacks on the integrated circuitsp. 84
8.4.4 Security standardsp. 85
Part 3 Overall Architecture of the IoT Chainp. 87
Chapter 9 Communication Models in IoTp. 89
9.1 Communication models in IoTp. 89
9.1.1 OSI modelp. 89
9.1.2 TCP/IP modelp. 92
9.1.3 By way of conclusionp. 98
Chapter 10 Overall Architecture of an IoT Systemp. 101
10.1 Overall architecture of a CT and IoT solutionp. 101
10.1.1 Description of the complete chainp. 102
10.2 From a more technological point of viewp. 102
10.2.1 Architecture and overview of an IoT chainp. 102
10.2.2 The "base station/gateway"p. 106
10.2.3 The "Cloud" zonep. 109
10.2.4 The "User" zonep. 110
10.3 The very numerous protocols involvedp. 113
Part 4 Detailed Description of the IoT Chainp. 117
Part 4A From the User (The Outside World) to the Thingp. 119
Chapter 11 From the Outside World to the Thingp. 121
11.1 Connection of the Thing to the outside worldp. 121
11.1.1 Using sensorsp. 121
11.1.2 Using wired connectionsp. 122
11.1.3 Using RF linksp. 122
11.1.4 Very Short Range (p. 122
11.1.5 Short range SR Wide band (tens of meters)p. 124
Chapter 12 The Secure Connected Thingp. 127
12.1 Physical constitution of the Thingp. 127
12.1.1 Sensorsp. 127
12.1.2 Local intelligence - microcontrollerp. 128
12.1.3 Security (SE)p. 128
Part 4B From the Thing to the Base Stationp. 131
Chapter 13 Means of Communication to Access a Base Stationp. 133
13.1 Possible network connectivity technologiesp. 133
13.1.1 Local or ultra-local non-operated RF networksp. 135
13.1.2 Extended-deployment operated RF networksp. 136
13.1.3 Is there space for all these technologies?p. 136
13.2 Medium-range MR Wide-band (hundreds of meters)p. 136
13.2.1 Wi-Fip. 137
13.3 Long-range (LR - tens of kilometers)p. 138
13.3.1 NB, UNB, WB, UWB, FHSS, DSSS and RF regulationsp. 138
13.3.2 Regulators and regulationsp. 140
13.3.3 RF basesp. 146
13.4 LTN - Low-Throughput Networkp. 152
13.4.1 Long Range LR - LTNp. 153
13.4.2 LR LTN in (U)NB - SIGFOXp. 156
13.4.3 LR LTN in DSSS (spectrum spreading) - LoRa, from Semtechp. 167
13.4.4 A discussion of spectrum spreading - SSp. 169
13.4.5 LR WBp. 192
13.4.6 Operated LR WB networksp. 196
Part 4C From the Base Station to the Serverp. 203
Chapter 14 Network Access Layer - IPp. 205
14.1 IPv4p. 205
14.1.1 Operationp. 206
14.1.2 Services providedp. 206
14.1.3 Reliabilityp. 206
14.2 IPv6p. 207
14.2.1 Differences between IPv6 and IPv4p. 207
14.2.2 Problems of privacy and/or anonymity?p. 209
14.3 6LoWPANp. 209
14.3.1 Description of the technologyp. 210
14.3.2 Integration of an IPv6 packet into an IEEE 802.15.4 framep. 210
14.3.3 Autoconfiguration of an IP addressp. 211
14.3.4 Network supervision and managementp. 211
14.3.5 Constraints on "upper-layer" applicationsp. 211
14.3.6 Securityp. 212
14.3.7 Routingp. 212
Chapter 15 The Serverp. 215
15.1 Conventional functions of a server in IoTp. 216
Chapter 16 Transport and Messaging Protocolsp. 219
16.1 Transportp. 219
16.1.1 Operationp. 220
16.1.2 Structure of a TCP segmentp. 220
16.2 "IoT messaging" technologiesp. 221
16.2.1 Main protocol parametersp. 221
16.3 Protocolsp. 225
16.4 HTTP-HyperText Transfer Protocolp. 226
16.5 HTTP/2p. 227
16.6 MQTT - Message Queuing Telemetry Transportp. 227
16.6.1 Security in MQTTp. 229
16.7 CoAP- Constrained Application Protocolp. 229
16.8 XMPPp. 230
16.9 DDS - Data Distribution Servicep. 231
16.10 AMQP - Advanced Message Queuing Protocolp. 232
16.11 SMQp. 233
16.12 JMS - Java Messaging Servicep. 233
16.13 Other protocolsp. 234
16.14 The brokerp. 234
16.14.1 Examples of possibilitiesp. 235
16.15 Programming languagesp. 236
16.16 Operating systemsp. 236
Part 4D From the Cloud Server to the Various Usersp. 237
Chapter 17 Cloud and Fog Computingp. 239
17.1 Cloud computing?p. 239
17.1.1 What is its mode of operation?p. 240
17.1.2 Advantages and benefits in IoT applicationsp. 240
17.1.3 Types of Cloud computingp. 241
17.1.4 Cloud products and servicesp. 241
17.2 Example: the PaaS platform AWS IoTp. 242
17.3 How security is managedp. 244
17.4 Fog computing?p. 245
17.5 Big datap. 246
17.6 Natural interfacesp. 247
Part 5 Concrete Realization of an IoT Solution Examples and Costsp. 249
Chapter 18 Examples of the Concrete Realization of Connected Thingsp. 251
18.1 Subject/application taken as an examplep. 251
18.1.1 Architecture of the product: a communicating physical Thingp. 253
18.1.2 Mandatory steps in creating the Thingp. 255
Chapter 19 Cost Aspectsp. 261
19.1 CAPEX and OPEX are in the same boatp. 261
19.1.1 Capexp. 262
19.1.2 Opexp. 273
19.1.3 Conclusionsp. 275
19.1.4 Very important conclusionsp. 276
Conclusionp. 279
Bibliographyp. 281
Indexp. 285
Go to:Top of Page