14%
Secure Connected Objects

Secure Connected Objects

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security, safety, ergonomic, economic, normative, regulations, etc.) involved in Secure Connected Objects projects. This book is written both for readers wishing to familiarize themselves with the complex issues surrounding networking objects and for those who design these connective "things".

Table of Contents:
Foreword xi Preface xiii Acknowledgements xv Preamble xvii Part 1 Introduction – The Buzz about IoT and IoE 1 Chapter 1 Introduction 3 1.1 Definition of communicating- or connected Things 3 1.1.1 Connected Things – Communicating Things 3 1.1.2 Definition of the IoT 4 1.1.3 Internet of X 5 Chapter 2 The (Overly) Vast World of IoT 9 2.1 2011–2016: the craze for the term “Connected Thing” 9 2.1.1 The catch-all 9 2.1.2 Fashion, buzz and “bubble” 10 2.1.3 “Hype” cycle for innovations 11 2.2 The true goal of this book 14 Chapter 3 Why a Connectable Thing? 15 3.1 Examples of connectable things 15 3.1.1 Home care for the elderly 16 3.1.2 In the automotive industry 19 Part 2 Constraints Surrounding an IoT Project 21 Chapter 4 Aspects to be Taken into Consideration 23 4.1 Aspects pertaining to the concrete realization of Connected Things 23 4.1.1 Financial and marketing aspects 24 4.1.2 Technical and industrial aspects 24 4.1.3 Regulatory and normative aspects 24 4.1.4 Security aspects 24 4.1.5 Cost aspects 24 Chapter 5 Financial and Marketing Aspects 27 5.1 Economic aspects 27 5.1.1 Saleable / buyable 27 5.2 Ergonomic aspects 29 5.2.1 Mechanical form and design vs ergonomics 29 Chapter 6 Technical and Industrial Aspects 31 6.1 Technical aspects 31 6.1.1 Life cycle of a new product 31 6.1.2 Techno-economic feasibility 32 6.1.3 Design 32 6.1.4 Industrialization, manufacturing process and quality assurance 32 6.2 Energy aspects 32 6.2.1 Power supply to the Thing 33 6.3 Industrial aspects 39 Chapter 7 Regulatory and Normative Aspects 41 7.1 Regulatory aspects and recommendations 41 7.1.1 Radiofrequency regulations 42 7.2 Health-related recommendations 43 7.2.1 Exposure of the human body to electromagnetic fields 44 7.2.2 Specific Absorption Rate (SAR) 44 7.3 Societal regulations and individual freedoms (privacy) 45 7.3.1 The various data needing to be protected 45 7.3.2 Loi Informatique et Libertés 45 7.3.3 Mandate 436, PIA and RFID and IoT applications 46 7.3.4 GDPR – General Data Protection Regulation 49 7.3.5 Privacy by design 51 7.4 Environmental regulations and recycling 53 7.4.1 Electronic waste treatment 53 7.4.2 Regulation and organization of the chain 54 7.4.3 Labeling of electrical and electronic equipment 54 7.5 Normative aspects 55 7.5.1 ISO/AFNOR 55 7.5.2 IEEE 56 7.5.3 ETSI 56 Chapter 8 Security Aspects 59 8.1 Security aspects 59 8.1.1 The weak links 60 8.1.2 Possible solutions 62 8.1.3 Definition and choice of security target 63 8.1.4 Concepts of security levels applied in IoT 64 8.1.5 True security – the “Secure Element” 67 8.1.6 Cryptography 70 8.1.7 Symmetric and asymmetric encryption 71 8.1.8 Consumer Things, IoT, security… and the Cloud 75 8.2 Judging the quality of security 80 8.3 Some thoughts about security, privacy and IoT 81 8.4 Vulnerabilities and attacks in the IoT chain 82 8.4.1 Attacks on the software layer 83 8.4.2 Attacks on the board or Thing 84 8.4.3 Attacks on the integrated circuits 84 8.4.4 Security standards 85 Part 3 Overall Architecture of the IoT Chain 87 Chapter 9 Communication Models in IoT 89 9.1 Communication models in IoT 89 9.1.1 OSI model 89 9.1.2 TCP/IP model 92 9.1.3 By way of conclusion 98 Chapter 10. Overall Architecture of an IoT System 101 10.1 Overall architecture of a CT and IoT solution 101 10.1.1 Description of the complete chain 102 10.2 From a more technological point of view 102 10.2.1 Architecture and overview of an IoT chain 102 10.2.2 The “base station/gateway” 106 10.2.3 The “Cloud” zone 109 10.2.4 The “User” zone 110 10.3 The very numerous protocols involved 113 Part 4 Detailed Description of the IoT Chain 117 Part 4A From the User (The Outside World) to the Thing 119 Chapter 11 From the Outside World to the Thing 121 11.1 Connection of the Thing to the outside world 121 11.1.1 Using sensors 121 11.1.2 Using wired connections 122 11.1.3 Using RF links 122 11.1.4 Very Short Range (<10 cm) 122 11.1.5 Short range SR Wide band (tens of meters) 124 Chapter 12 The Secure Connected Thing 127 12.1 Physical constitution of the Thing 127 12.1.1 Sensors 127 12.1.2 Local intelligence – microcontroller 128 12.1.3 Security (SE)… 128 Part 4B From the Thing to the Base Station 131 Chapter 13 Means of Communication to Access a Base Station 133 13.1 Possible network connectivity technologies 133 13.1.1 Local or ultra-local non-operated RF networks 135 13.1.2 Extended-deployment operated RF networks 136 13.1.3 Is there space for all these technologies? 136 13.2 Medium-range MR Wide-band (hundreds of meters) 136 13.2.1 Wi-Fi 137 13.3 Long-range (LR– tens of kilometers) 138 13.3.1 NB, UNB, WB, UWB, FHSS, DSSS and RF regulations 138 13.3.2 Regulators and regulations 140 13.3.3 RF bases 146 13.4 LTN – Low-Throughput Network 152 13.4.1 Long Range LR - LTN 153 13.4.2 LR LTN in (U)NB– SIGFOX 156 13.4.3 LR LTN in DSSS (spectrum spreading) – LoRa, from Semtech 167 13.4.4 A discussion of spectrum spreading – SS 169 13.4.5 LR WB 192 13.4.6 Operated LR WB networks 196 Part 4C From the Base Station to the Server 203 Chapter 14 Network Access Layer – IP 205 14.1 IPv4 205 14.1.1 Operation 206 14.1.2 Services provided 206 14.1.3 Reliability 206 14.2 IPv6 207 14.2.1 Differences between IPv6 and IPv4 207 14.2.2 Problems of privacy and/or anonymity? 209 14.3 6LoWPAN 209 14.3.1 Description of the technology 210 14.3.2 Integration of an IPv6 packet into an IEEE 802.15.4 frame 210 14.3.3 Autoconfiguration of an IP address 211 14.3.4 Network supervision and management 211 14.3.5 Constraints on “upper-layer” applications 211 14.3.6 Security 212 14.3.7 Routing 212 Chapter 15 The Server 215 15.1 Conventional functions of a server in IoT 216 Chapter 16 Transport and Messaging Protocols 219 16.1 Transport 219 16.1.1 Operation 220 16.1.2 Structure of a TCP segment 220 16.2 “IoT messaging” technologies 221 16.2.1 Main protocol parameters 221 16.3 Protocols 225 16.4 HTTP – HyperText Transfer Protocol 226 16.5 Http/2 227 16.6 MQTT – Message Queuing Telemetry Transport 227 16.6.1 Security in MQTT 229 16.7 CoAP – Constrained Application Protocol 229 16.8 XMPP 230 16.9 DDS – Data Distribution Service 231 16.10 AMQP – Advanced Message Queuing Protocol 232 16.11 SMQ 233 16.12 JMS – Java Messaging Service 233 16.13 Other protocols 234 16.14 The broker 234 16.14.1 Examples of possibilities 235 16.15 Programming languages 236 16.16 Operating systems 236 Part 4D From the Cloud Server to the Various Users 237 Chapter 17 Cloud and Fog Computing 239 17.1 Cloud computing? 239 17.1.1 What is its mode of operation? 240 17.1.2 Advantages and benefits in IoT applications 240 17.1.3 Types of Cloud computing 241 17.1.4 Cloud products and services 241 17.2 Example: the PaaS platform AWS IoT 242 17.3 How security is managed 244 17.4 Fog computing? 245 17.5 Big data 246 17.6 Natural interfaces 247 Part 5 Concrete Realization of an IoT Solution Examples and Costs 249 Chapter 18 Examples of the Concrete Realization of Connected Things 251 18.1 Subject/application taken as an example 251 18.1.1 Architecture of the product: a communicating physical Thing 253 18.1.2 Mandatory steps in creating the Thing 255 Chapter 19 Cost Aspects 261 19.1 CAPEX and OPEX are in the same boat… 261 19.1.1 CAPEX 262 19.1.2 OPEX 273 19.1.3 Conclusions 275 19.1.4 Very important conclusions 276 Conclusion 279 Bibliography 281 Index 285


Best Sellers


Product Details
  • ISBN-13: 9781786300591
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 239 mm
  • No of Pages: 320
  • Series Title: English
  • Weight: 567 gr
  • ISBN-10: 1786300591
  • Publisher Date: 23 May 2017
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 23 mm
  • Width: 163 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Secure Connected Objects
ISTE Ltd and John Wiley & Sons Inc -
Secure Connected Objects
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Secure Connected Objects

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA