1 option
Secure connected objects / Dominique Paret, Jean-Paul Huon.
- Format:
- Book
- Author/Creator:
- Paret, Dominique, author.
- Huon, Jean-Paul, author.
- Series:
- THEi Wiley ebooks.
- THEi Wiley ebooks
- Language:
- English
- Subjects (All):
- Internet--Security measures.
- Internet.
- Physical Description:
- 1 online resource (319 pages) : illustrations
- Edition:
- 1st ed.
- Place of Publication:
- London, England ; Hoboken, New Jersey : Wiley-ISTE, 2017.
- System Details:
- Access using campus network via VPN at home (THEi Users Only).
- Summary:
- In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects. This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".
- Contents:
- Cover
- Half-Title Page
- Title Page
- Copyright Page
- Contents
- Foreword
- Preface
- Acknowledgements
- Preamble
- PART 1. Introduction - The Buzz about IoT and IoE
- 1. Introduction
- 1.1. Definition of communicating- or connected Things
- 1.1.1. Connected Things - Communicating Things
- 1.1.2. Definition of the IoT
- 1.1.3. Internet of x
- 2. The (Overly) Vast World of IoT
- 2.1. 2011-2016: the craze for the term "Connected Thing"
- 2.1.1. The catch-all
- 2.1.2. Fashion, buzz and "bubble
- 2.1.3. "Hype" cycle for innovations
- 2.2. The True Goal of This Book
- 3. Why a Connectable Thing?
- 3.1. Examples of connectable things
- 3.1.1. Home care for the elderly
- 3.1.2. In the automotive industry
- PART 2. Constraints Surrounding an IoT Project
- 4. Aspects to be Taken into Consideration
- 4.1. Aspects pertaining to the concrete realization of Connected Things
- 4.1.1. Financial and marketing aspects
- 4.1.2. Technical and industrial aspects
- 4.1.3. Regulatory and normative aspects
- 4.1.4. Security aspects
- 4.1.5. Cost aspects
- 5. Financial and Marketing Aspects
- 5.1. Economic aspects
- 5.1.1. Saleable / buyable
- 5.2. Ergonomic aspects
- 5.2.1. Mechanical form and design vs ergonomics
- 6. Technical and Industrial Aspects
- 6.1. Technical aspects
- 6.1.1. Life cycle of a new product
- 6.1.2. Techno-economic feasibility
- 6.1.3. Design
- 6.1.4. Industrialization, manufacturing process and quality assurance
- 6.2. Energy aspects
- 6.2.1. Power supply to the Thing
- 6.3. Industrial aspects
- 7. Regulatory and Normative Aspects
- 7.1. Regulatory aspects and recommendations
- 7.1.1. Radiofrequency regulations
- 7.2. Health-related recommendations
- 7.2.1. Exposure of the human body to electromagnetic fields
- 7.2.2. Specific Absorption Rate (SAR).
- 7.3. Societal regulations and individual freedoms (privacy)
- 7.3.1. The various data needing to be protected
- 7.3.2. Loi Informatique et Libertés
- 7.3.3. Mandate 436, PIA and RFID and IoT applications
- 7.3.4. GDPR - General Data Protection Regulation
- 7.3.5. Privacy by design
- 7.4. Environmental regulations and recycling
- 7.4.1. Electronic waste treatment
- 7.4.2. Regulation and organization of the chain
- 7.4.3. Labeling of electrical and electronic equipment
- 7.5. Normative aspects
- 7.5.1. ISO/AFNOR
- 7.5.2. IEEE
- 7.5.3. ETSI
- 8. Security Aspects
- 8.1. Security aspects
- 8.1.1. The weak links
- 8.1.2. Possible solutions
- 8.1.3. Definition and choice of security target
- 8.1.4. Concepts of security levels applied in IoT
- 8.1.5. True security - the "Secure Element"
- 8.1.6. Cryptography
- 8.1.7. Symmetric and asymmetric encryption
- 8.1.8. Consumer Things, IoT, security… and the Cloud
- 8.2. Judging the quality of security
- 8.3. Some thoughts about security, privacy and IoT
- 8.4. Vulnerabilities and attacks in the IoT chain
- 8.4.1. Attacks on the software layer
- 8.4.2. Attacks on the board or Thing
- 8.4.3. Attacks on the integrated circuits
- 8.4.4. Security standards
- PART 3. Overall Architecture of the IoT Chain
- 9. Communication Models in IoT
- 9.1. Communication models in IoT
- 9.1.1. OSI model
- 9.1.2. TCP/IP model
- 9.1.3. By way of conclusion
- 10. Overall Architecture of an IoT System
- 10.1. Overall architecture of a CT and IoT solution
- 10.1.1. Description of the complete chain
- 10.2. From a more technological point of view
- 10.2.1. Architecture and overview of an IoT chain
- 10.2.2. The "base station/gateway"
- 10.2.3. The "cloud" zone
- 10.2.4. The "User" zone
- 10.3. The very numerous protocols involved
- PART 4. Detailed Description of the IoT Chain.
- PART 4A. From the User (The Outside World) to the Thing
- 11. From the Outside World to the Thing
- 11.1. Connection of the Thing to the outside world
- 11.1.1. Using sensors
- 11.1.2. Using wired connections
- 11.1.3. Using RF links
- 11.1.4. Very Short Range (<
- 10 cm)
- 11.1.5. Short range SR Wide band (tens of meters)
- 12. The Secure Connected Thing
- 12.1. Physical constitution of the Thing
- 12.1.1. Sensors
- 12.1.2. Local intelligence - microcontroller
- 12.1.3. Security (SE) …
- PART 4B. From the Thing to the Base Station
- 13. Means of Communication to Access a Base Station
- 13.1. Possible network connectivity technologies
- 13.1.1. Local or ultra-local non-operated RF networks
- 13.1.2. Extended-deployment operated RF networks
- 13.1.3. Is there space for all these technologies?
- 13.2. Medium-range MR Wide-band (hundreds of meters)
- 13.2.1. Wi-Fi
- 13.3. Long-range (LR - tens of kilometers)
- 13.3.1. NB, UNB, WB, UWB, FHSS, DSSS and RF regulations
- 13.3.2. Regulators and regulations
- 13.3.3. RF bases
- 13.4. LTN - Low-Throughput Network
- 13.4.1. Long Range LR - LTN
- 13.4.2. LR LTN in (U)NB - SIGFOX
- 13.4.3. LR LTN in DSSS (spectrum spreading) - LoRa, from Semtech
- 13.4.4. A discussion of spectrum spreading - SS
- 13.4.5. LR WB
- 13.4.6. Operated LR WB networks
- PART 4C. From the Base Station to the Server
- 14. Network Access Layer - IP
- 14.1. IPv4
- 14.1.1. Operation
- 14.1.2. Services provided
- 14.1.3. Reliability
- 14.2. IPv6
- 14.2.1. Differences between IPv6 and IPv4
- 14.2.2. Problems of privacy and/or anonymity?
- 14.3. 6LoWPAN
- 14.3.1. Description of the technology
- 14.3.2. Integration of an IPv6 packet into an IEEE 802.15.4 frame
- 14.3.3. Autoconfiguration of an IP address
- 14.3.4. Network supervision and management.
- 14.3.5. Constraints on "upper-layer" applications
- 14.3.6. Security
- 14.3.7. Routing
- 15. The Server
- 15.1. Conventional functions of a server in IoT
- 16. Transport and Messaging Protocols
- 16.1. Transport
- 16.1.1. Operation
- 16.1.2. Structure of a TCP segment
- 16.2. "IoT messaging" technologies
- 16.2.1. Main protocol parameters
- 16.3. Protocols
- 16.4. HTTP - HyperText Transfer Protocol
- 16.5. HTTP/2
- 16.6. MQTT - Message Queuing Telemetry Transport
- 16.6.1. Security in MQTT
- 16.7. CoAP - Constrained Application Protocol
- 16.8. XMPP
- 16.9. DDS - Data Distribution Service
- 16.10. AMQP - Advanced Message Queuing Protocol
- 16.11. SMQ
- 16.12. JMS - Java Messaging Service
- 16.13. Other protocols
- 16.14. The broker
- 16.14.1. Examples of possibilities
- 16.15. Programming languages
- 16.16. Operating systems
- PART 4D. From the Cloud Server to the Various Users
- 17. Cloud and Fog Computing
- 17.1. Cloud computing?
- 17.1.1. What is its mode of operation?
- 17.1.2. Advantages and benefits in IoT applications
- 17.1.3. Types of Cloud computing
- 17.1.4. Cloud products and services
- 17.2. Example: The PaaS platform AWS loT
- 17.3. How security is managed
- 17.4. Fog computing?
- 17.5. Big data
- 17.6. Natural interfaces
- PART 5. Concrete Realization of an IoT Solution Examples and Costs
- 18. Examples of the Concrete Realization of Connected Things
- 18.1. Subject/application taken as an example
- 18.1.1. Architecture of the product: a communicating physical Thing
- 18.1.2. Mandatory steps in creating the Thing
- 19. Cost Aspects
- 19.1. CAPEX and OPEX are in the same boat…
- 19.1.1. CAPEX
- 19.1.2. OPEX
- 19.1.3. Conclusions
- 19.1.4. Very important conclusions
- Conclusion
- Bibliography
- Index
- Other titles from iSTE in Waves
- EULA.
- Notes:
- Includes bibliographical references and index.
- Description based on print version record.
- ISBN:
- 9781119426639
- 1119426634
- 9781119426561
- 1119426561
- 9781119426486
- 1119426480
- OCLC:
- 988607689
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.