Cargando…

Design of Secure IoT Systems : A Practical Approach Across Industries /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Arora, Sumeet (Autor), Gambheer, Ramachandra (Autor), Vohra, Meenakshi (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, N.Y. : McGraw-Hill Education, [2021]
Edición:First edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000nam a2200000 i 4500
001 MGH_AEACE21102003
003 IN-ChSCO
005 20211020125402.0
006 m|||||||||||||||||
007 cr |n||||||||n
008 211020s2021||||nyu|||||o|||||||||||eng||
010 |z  2021938433 
020 |a 9781260463101 (e-ISBN) 
020 |a 1260463109 (e-ISBN) 
020 |a 9781260463095 (print-ISBN) 
020 |a 1260463095 (print-ISBN) 
035 |a (OCoLC)1277047947 
040 |a IN-ChSCO  |b eng  |e rda 
041 0 |a eng 
050 4 |a TK5105.8857 
072 7 |a TEC  |x 007000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Arora, Sumeet,  |e author. 
245 1 0 |a Design of Secure IoT Systems :  |b A Practical Approach Across Industries /  |c Sumeet Arora, Ramachandra Gambheer, Meenakshi Vohra. 
250 |a First edition. 
264 1 |a New York, N.Y. :  |b McGraw-Hill Education,   |c [2021] 
264 4 |c ?2021 
300 |a 1 online resource (224 pages) :  |b illustrations. 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- 1 Evolution of IoT -- 1.1 Introduction to Digital Transformation -- 1.2 Connected Value Chain -- 1.3 What Is Digital Transformation? -- 1.4 Introduction to IoT -- 1.5 Building Blocks of IoT System -- 1.6 Evolution of IoT -- 1.7 Connected Vehicle Use Case -- 1.8 Chapters Overview -- 2 IoT Architecture and Technology Essentials -- 2.1 Introduction -- 2.2 IoT System Architecture -- 2.3 IoT Technology and Protocols -- 2.4 Applying Learnings to Connected Vehicle Use Case -- 2.5 Conclusion -- 3 Connected Machines -- 3.1 Introduction -- 3.2 Machine-to-Machine (M2M) Segments -- 3.3 M2M Communication -- 3.4 Applications of M2M -- 3.5 Key Features of M2M -- 3.6 Architecture and Components of M2M -- 3.7 M2M Application Communication Principles -- 3.8 Issues/Concerns in M2M -- 3.9 Standardization Efforts for M2M -- 3.10 Conclusion -- 4 Network Architecture for IoT -- 4.1 Introduction -- 4.2 Network Terminology -- 4.3 ISO-OSI Reference Model -- 4.4 Network Protocols -- 4.5 WAN Architecture -- 4.6 MAC Source Address -- 4.7 Data Reception -- 4.8 Multiprotocol Label Switching -- 4.9 Data Center -- 4.10 Data Center Networking -- 4.11 IoT Gateways -- 4.12 Conclusion -- 5 IoT Hardware Design Fundamentals -- 5.1 Introduction -- 5.2 Hardware System Requirements -- 5.3 Hardware Functional Specifications -- 5.4 Software Functional Specifications -- 5.5 Hardware Component Selection -- 5.6 Design for Manufacturability -- 5.7 Design for Testability -- 5.8 Schematics, Layout, and Gerbers -- 5.9 PCB Fabrication and Assembly -- 5.10 Summarizing HW Design Flow -- 5.11 Applying Learnings to Connected Vehicle Use Case -- 5.12 Examples of Commercially Available IoT Devices -- 5.13 Standards Used in HW Component Configurations -- 5.14 Selection of Network Hardware for IoT Applications -- 5.15 IoT Hardware Security -- 5.16 Conclusion -- 6 IoT Data Systems Design -- 6.1 Introduction -- 6.2 IoT Data System -- 6.3 Value Chain Activity Generates Data -- 6.4 Operational Data: Sensors and Devices -- 6.5 Business and Customer/User Data -- 6.6 Intersection of Operational Data and Business Data -- 6.7 Structured and Unstructured Data -- 6.8 Data Systems Design -- 6.9 Data Transport -- 6.10 Data Collection -- 6.11 Data Storage -- 6.12 Data Preparation -- 6.13 Organizing Data for Analytics -- 6.14 Data Lake, Data Warehouses, and Efficient Access to Data -- 6.15 Analytics and Business Intelligence -- 6.16 Data Science and IoT -- 6.17 Machine Learning -- 6.18 Putting It Together to Build an IoT Data System -- 6.19 Applying Learnings to Connected Vehicle Use Case -- 6.20 Conclusion -- 7 IoT: Designing with Trust and Security -- 7.1 Introduction -- 7.2 Need for a Secure IoT System -- 7.3 Requirements for Secure IoT System -- 7.4 IoT Device Security -- 7.5 Trusted IoT Device -- 7.6 Trusted Device Identity -- 7.7 IoT Device Secure Storage -- 7.8 Secure Boot and Trusted Execution Environment -- 7.9 Secure Root of Trust -- 7.10 Trustworthy Firmware and Software -- 7.11 Public Key Infrastructure -- 7.12 Trusted Supply Chain -- 7.13 Secure Random Number Generator -- 7.14 IoT D2X (Device to X) Communication Security -- 7.15 Mutually Authenticated Endpoints -- 7.16 Secure Communication Channel and End-to-End Message Integrity -- 7.17 Secure Monitoring Systems -- 7.18 IoT Device to Cloud Security -- 7.19 IoT Data Security Policies and Regulations -- 7.20 IoT Trusted Platform -- 7.21 Secure Authentication -- 7.22 End-to-End Security (Including Third Parties) -- 7.23 Applying Learnings to Connected Vehicle Use Case -- 7.24 Conclusion -- Appendix: IoT Cybersecurity Threats and Risks Review Sample -- 8 Automation -- 8.1 Introduction -- 8.2 IoT Device Life Cycle Management -- 8.3 Zero Touch IoT Devices -- 8.4 Plug and Play IoT Devices -- 8.5 IoT SIM Cards and Management -- 8.6 Commercially Available IoT Control Software -- 8.7 Secure Automation of IoT Network Infrastructure -- 8.8 IoT Application Software Design Principles -- 8.9 Cloud Native Software -- 8.10 Automation of Value Chain Workflows -- 8.11 Edge Computing and Cloud Computing -- 8.12 Applying Learnings to Connected Vehicle Use Case -- 8.13 Conclusion -- 9 IoT Use Cases Across Industries -- 9.1 Introduction -- 9.2 Manufacturing Sector -- 9.3 Connected Vehicles -- 9.4 Seaport Automation -- 9.5 Airport Automation -- 9.6 Drones for Medical/Healthcare Systems -- 9.7 IoT Application in Oil and Natural Gas Industry -- 9.8 Conclusion -- 10 IoT Use Case Exercises -- 10.1 Banking Sector/Bank of Things -- 10.2 Agriculture?Agri of Things -- 10.3 Enhanced Smart Home (Home Automation) -- 10.4 Smart Manufacturing -- 10.5 Internet of Medical Things (IoMT) -- 10.6 Smart City with Smart Vehicles and Smart Home -- 10.7 Smart Grid -- References -- Index. 
530 |a Also available in print edition. 
533 |a Electronic reproduction.  |b New York, N.Y. :  |c McGraw Hill,  |d 2021.  |n Mode of access: World Wide Web.  |n System requirements: Web browser.  |n Access may be restricted to users at subscribing institutions. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 |a Description based on e-Publication PDF. 
650 0 |a Internet of things  |x Security measures. 
655 0 |a Electronic books. 
700 1 |a Gambheer, Ramachandra,  |e author. 
700 1 |a Vohra, Meenakshi,  |e author. 
776 0 8 |i Print version:   |t Design of Secure IoT Systems : A Practical Approach Across Industries.  |b First Edition.  |d New York, N.Y. : McGraw-Hill Education, 2021  |z 9781260463095  |w (OCLC)1259545771 
856 4 0 |u https://accessengineeringlibrary.uam.elogim.com/content/book/9781260463095  |z Texto completo