Design of Secure IoT Systems : A Practical Approach Across Industries /
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, N.Y. :
McGraw-Hill Education,
[2021]
|
Edición: | First edition. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- 1 Evolution of IoT
- 1.1 Introduction to Digital Transformation
- 1.2 Connected Value Chain
- 1.3 What Is Digital Transformation?
- 1.4 Introduction to IoT
- 1.5 Building Blocks of IoT System
- 1.6 Evolution of IoT
- 1.7 Connected Vehicle Use Case
- 1.8 Chapters Overview
- 2 IoT Architecture and Technology Essentials
- 2.1 Introduction
- 2.2 IoT System Architecture
- 2.3 IoT Technology and Protocols
- 2.4 Applying Learnings to Connected Vehicle Use Case
- 2.5 Conclusion
- 3 Connected Machines
- 3.1 Introduction
- 3.2 Machine-to-Machine (M2M) Segments
- 3.3 M2M Communication
- 3.4 Applications of M2M
- 3.5 Key Features of M2M
- 3.6 Architecture and Components of M2M
- 3.7 M2M Application Communication Principles
- 3.8 Issues/Concerns in M2M
- 3.9 Standardization Efforts for M2M
- 3.10 Conclusion
- 4 Network Architecture for IoT
- 4.1 Introduction
- 4.2 Network Terminology
- 4.3 ISO-OSI Reference Model
- 4.4 Network Protocols
- 4.5 WAN Architecture
- 4.6 MAC Source Address
- 4.7 Data Reception
- 4.8 Multiprotocol Label Switching
- 4.9 Data Center
- 4.10 Data Center Networking
- 4.11 IoT Gateways
- 4.12 Conclusion
- 5 IoT Hardware Design Fundamentals
- 5.1 Introduction
- 5.2 Hardware System Requirements
- 5.3 Hardware Functional Specifications
- 5.4 Software Functional Specifications
- 5.5 Hardware Component Selection
- 5.6 Design for Manufacturability
- 5.7 Design for Testability
- 5.8 Schematics, Layout, and Gerbers
- 5.9 PCB Fabrication and Assembly
- 5.10 Summarizing HW Design Flow
- 5.11 Applying Learnings to Connected Vehicle Use Case
- 5.12 Examples of Commercially Available IoT Devices
- 5.13 Standards Used in HW Component Configurations
- 5.14 Selection of Network Hardware for IoT Applications
- 5.15 IoT Hardware Security
- 5.16 Conclusion
- 6 IoT Data Systems Design
- 6.1 Introduction
- 6.2 IoT Data System
- 6.3 Value Chain Activity Generates Data
- 6.4 Operational Data: Sensors and Devices
- 6.5 Business and Customer/User Data
- 6.6 Intersection of Operational Data and Business Data
- 6.7 Structured and Unstructured Data
- 6.8 Data Systems Design
- 6.9 Data Transport
- 6.10 Data Collection
- 6.11 Data Storage
- 6.12 Data Preparation
- 6.13 Organizing Data for Analytics
- 6.14 Data Lake, Data Warehouses, and Efficient Access to Data
- 6.15 Analytics and Business Intelligence
- 6.16 Data Science and IoT
- 6.17 Machine Learning
- 6.18 Putting It Together to Build an IoT Data System
- 6.19 Applying Learnings to Connected Vehicle Use Case
- 6.20 Conclusion
- 7 IoT: Designing with Trust and Security
- 7.1 Introduction
- 7.2 Need for a Secure IoT System
- 7.3 Requirements for Secure IoT System
- 7.4 IoT Device Security
- 7.5 Trusted IoT Device
- 7.6 Trusted Device Identity
- 7.7 IoT Device Secure Storage
- 7.8 Secure Boot and Trusted Execution Environment
- 7.9 Secure Root of Trust
- 7.10 Trustworthy Firmware and Software
- 7.11 Public Key Infrastructure
- 7.12 Trusted Supply Chain
- 7.13 Secure Random Number Generator
- 7.14 IoT D2X (Device to X) Communication Security
- 7.15 Mutually Authenticated Endpoints
- 7.16 Secure Communication Channel and End-to-End Message Integrity
- 7.17 Secure Monitoring Systems
- 7.18 IoT Device to Cloud Security
- 7.19 IoT Data Security Policies and Regulations
- 7.20 IoT Trusted Platform
- 7.21 Secure Authentication
- 7.22 End-to-End Security (Including Third Parties)
- 7.23 Applying Learnings to Connected Vehicle Use Case
- 7.24 Conclusion
- Appendix: IoT Cybersecurity Threats and Risks Review Sample
- 8 Automation
- 8.1 Introduction
- 8.2 IoT Device Life Cycle Management
- 8.3 Zero Touch IoT Devices
- 8.4 Plug and Play IoT Devices
- 8.5 IoT SIM Cards and Management
- 8.6 Commercially Available IoT Control Software
- 8.7 Secure Automation of IoT Network Infrastructure
- 8.8 IoT Application Software Design Principles
- 8.9 Cloud Native Software
- 8.10 Automation of Value Chain Workflows
- 8.11 Edge Computing and Cloud Computing
- 8.12 Applying Learnings to Connected Vehicle Use Case
- 8.13 Conclusion
- 9 IoT Use Cases Across Industries
- 9.1 Introduction
- 9.2 Manufacturing Sector
- 9.3 Connected Vehicles
- 9.4 Seaport Automation
- 9.5 Airport Automation
- 9.6 Drones for Medical/Healthcare Systems
- 9.7 IoT Application in Oil and Natural Gas Industry
- 9.8 Conclusion
- 10 IoT Use Case Exercises
- 10.1 Banking Sector/Bank of Things
- 10.2 Agriculture?Agri of Things
- 10.3 Enhanced Smart Home (Home Automation)
- 10.4 Smart Manufacturing
- 10.5 Internet of Medical Things (IoMT)
- 10.6 Smart City with Smart Vehicles and Smart Home
- 10.7 Smart Grid
- References
- Index.