My Account Log in

1 option

Secure connected objects / Dominique Paret, Jean-Paul Huon.

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Paret, Dominique, author.
Huon, Jean-Paul, author.
Series:
THEi Wiley ebooks.
THEi Wiley ebooks
Language:
English
Subjects (All):
Internet--Security measures.
Internet.
Physical Description:
1 online resource (319 pages) : illustrations
Edition:
1st ed.
Place of Publication:
London, England ; Hoboken, New Jersey : Wiley-ISTE, 2017.
System Details:
Access using campus network via VPN at home (THEi Users Only).
Summary:
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects. This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".
Contents:
Cover
Half-Title Page
Title Page
Copyright Page
Contents
Foreword
Preface
Acknowledgements
Preamble
PART 1. Introduction - The Buzz about IoT and IoE
1. Introduction
1.1. Definition of communicating- or connected Things
1.1.1. Connected Things - Communicating Things
1.1.2. Definition of the IoT
1.1.3. Internet of x
2. The (Overly) Vast World of IoT
2.1. 2011-2016: the craze for the term "Connected Thing"
2.1.1. The catch-all
2.1.2. Fashion, buzz and "bubble
2.1.3. "Hype" cycle for innovations
2.2. The True Goal of This Book
3. Why a Connectable Thing?
3.1. Examples of connectable things
3.1.1. Home care for the elderly
3.1.2. In the automotive industry
PART 2. Constraints Surrounding an IoT Project
4. Aspects to be Taken into Consideration
4.1. Aspects pertaining to the concrete realization of Connected Things
4.1.1. Financial and marketing aspects
4.1.2. Technical and industrial aspects
4.1.3. Regulatory and normative aspects
4.1.4. Security aspects
4.1.5. Cost aspects
5. Financial and Marketing Aspects
5.1. Economic aspects
5.1.1. Saleable / buyable
5.2. Ergonomic aspects
5.2.1. Mechanical form and design vs ergonomics
6. Technical and Industrial Aspects
6.1. Technical aspects
6.1.1. Life cycle of a new product
6.1.2. Techno-economic feasibility
6.1.3. Design
6.1.4. Industrialization, manufacturing process and quality assurance
6.2. Energy aspects
6.2.1. Power supply to the Thing
6.3. Industrial aspects
7. Regulatory and Normative Aspects
7.1. Regulatory aspects and recommendations
7.1.1. Radiofrequency regulations
7.2. Health-related recommendations
7.2.1. Exposure of the human body to electromagnetic fields
7.2.2. Specific Absorption Rate (SAR).
7.3. Societal regulations and individual freedoms (privacy)
7.3.1. The various data needing to be protected
7.3.2. Loi Informatique et Libertés
7.3.3. Mandate 436, PIA and RFID and IoT applications
7.3.4. GDPR - General Data Protection Regulation
7.3.5. Privacy by design
7.4. Environmental regulations and recycling
7.4.1. Electronic waste treatment
7.4.2. Regulation and organization of the chain
7.4.3. Labeling of electrical and electronic equipment
7.5. Normative aspects
7.5.1. ISO/AFNOR
7.5.2. IEEE
7.5.3. ETSI
8. Security Aspects
8.1. Security aspects
8.1.1. The weak links
8.1.2. Possible solutions
8.1.3. Definition and choice of security target
8.1.4. Concepts of security levels applied in IoT
8.1.5. True security - the "Secure Element"
8.1.6. Cryptography
8.1.7. Symmetric and asymmetric encryption
8.1.8. Consumer Things, IoT, security… and the Cloud
8.2. Judging the quality of security
8.3. Some thoughts about security, privacy and IoT
8.4. Vulnerabilities and attacks in the IoT chain
8.4.1. Attacks on the software layer
8.4.2. Attacks on the board or Thing
8.4.3. Attacks on the integrated circuits
8.4.4. Security standards
PART 3. Overall Architecture of the IoT Chain
9. Communication Models in IoT
9.1. Communication models in IoT
9.1.1. OSI model
9.1.2. TCP/IP model
9.1.3. By way of conclusion
10. Overall Architecture of an IoT System
10.1. Overall architecture of a CT and IoT solution
10.1.1. Description of the complete chain
10.2. From a more technological point of view
10.2.1. Architecture and overview of an IoT chain
10.2.2. The "base station/gateway"
10.2.3. The "cloud" zone
10.2.4. The "User" zone
10.3. The very numerous protocols involved
PART 4. Detailed Description of the IoT Chain.
PART 4A. From the User (The Outside World) to the Thing
11. From the Outside World to the Thing
11.1. Connection of the Thing to the outside world
11.1.1. Using sensors
11.1.2. Using wired connections
11.1.3. Using RF links
11.1.4. Very Short Range (&lt
10 cm)
11.1.5. Short range SR Wide band (tens of meters)
12. The Secure Connected Thing
12.1. Physical constitution of the Thing
12.1.1. Sensors
12.1.2. Local intelligence - microcontroller
12.1.3. Security (SE) …
PART 4B. From the Thing to the Base Station
13. Means of Communication to Access a Base Station
13.1. Possible network connectivity technologies
13.1.1. Local or ultra-local non-operated RF networks
13.1.2. Extended-deployment operated RF networks
13.1.3. Is there space for all these technologies?
13.2. Medium-range MR Wide-band (hundreds of meters)
13.2.1. Wi-Fi
13.3. Long-range (LR - tens of kilometers)
13.3.1. NB, UNB, WB, UWB, FHSS, DSSS and RF regulations
13.3.2. Regulators and regulations
13.3.3. RF bases
13.4. LTN - Low-Throughput Network
13.4.1. Long Range LR - LTN
13.4.2. LR LTN in (U)NB - SIGFOX
13.4.3. LR LTN in DSSS (spectrum spreading) - LoRa, from Semtech
13.4.4. A discussion of spectrum spreading - SS
13.4.5. LR WB
13.4.6. Operated LR WB networks
PART 4C. From the Base Station to the Server
14. Network Access Layer - IP
14.1. IPv4
14.1.1. Operation
14.1.2. Services provided
14.1.3. Reliability
14.2. IPv6
14.2.1. Differences between IPv6 and IPv4
14.2.2. Problems of privacy and/or anonymity?
14.3. 6LoWPAN
14.3.1. Description of the technology
14.3.2. Integration of an IPv6 packet into an IEEE 802.15.4 frame
14.3.3. Autoconfiguration of an IP address
14.3.4. Network supervision and management.
14.3.5. Constraints on "upper-layer" applications
14.3.6. Security
14.3.7. Routing
15. The Server
15.1. Conventional functions of a server in IoT
16. Transport and Messaging Protocols
16.1. Transport
16.1.1. Operation
16.1.2. Structure of a TCP segment
16.2. "IoT messaging" technologies
16.2.1. Main protocol parameters
16.3. Protocols
16.4. HTTP - HyperText Transfer Protocol
16.5. HTTP/2
16.6. MQTT - Message Queuing Telemetry Transport
16.6.1. Security in MQTT
16.7. CoAP - Constrained Application Protocol
16.8. XMPP
16.9. DDS - Data Distribution Service
16.10. AMQP - Advanced Message Queuing Protocol
16.11. SMQ
16.12. JMS - Java Messaging Service
16.13. Other protocols
16.14. The broker
16.14.1. Examples of possibilities
16.15. Programming languages
16.16. Operating systems
PART 4D. From the Cloud Server to the Various Users
17. Cloud and Fog Computing
17.1. Cloud computing?
17.1.1. What is its mode of operation?
17.1.2. Advantages and benefits in IoT applications
17.1.3. Types of Cloud computing
17.1.4. Cloud products and services
17.2. Example: The PaaS platform AWS loT
17.3. How security is managed
17.4. Fog computing?
17.5. Big data
17.6. Natural interfaces
PART 5. Concrete Realization of an IoT Solution Examples and Costs
18. Examples of the Concrete Realization of Connected Things
18.1. Subject/application taken as an example
18.1.1. Architecture of the product: a communicating physical Thing
18.1.2. Mandatory steps in creating the Thing
19. Cost Aspects
19.1. CAPEX and OPEX are in the same boat…
19.1.1. CAPEX
19.1.2. OPEX
19.1.3. Conclusions
19.1.4. Very important conclusions
Conclusion
Bibliography
Index
Other titles from iSTE in Waves
EULA.
Notes:
Includes bibliographical references and index.
Description based on print version record.
ISBN:
9781119426639
1119426634
9781119426561
1119426561
9781119426486
1119426480
OCLC:
988607689

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account