Limit search to available items
Book Cover
E-book
Author Arora, Sumeet, author

Title Design of Secure IoT Systems : A Practical Approach Across Industries / Sumeet Arora, Ramachandra Gambheer, Meenakshi Vohra
Edition First edition
Published New York, N.Y. : McGraw-Hill Education, [2021]
©2021

Copies

Description 1 online resource (224 pages) : illustrations
Contents Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- 1 Evolution of IoT -- 1.1 Introduction to Digital Transformation -- 1.2 Connected Value Chain -- 1.3 What Is Digital Transformation? -- 1.4 Introduction to IoT -- 1.5 Building Blocks of IoT System -- 1.6 Evolution of IoT -- 1.7 Connected Vehicle Use Case -- 1.8 Chapters Overview -- 2 IoT Architecture and Technology Essentials -- 2.1 Introduction -- 2.2 IoT System Architecture -- 2.3 IoT Technology and Protocols -- 2.4 Applying Learnings to Connected Vehicle Use Case -- 2.5 Conclusion -- 3 Connected Machines -- 3.1 Introduction -- 3.2 Machine-to-Machine (M2M) Segments -- 3.3 M2M Communication -- 3.4 Applications of M2M -- 3.5 Key Features of M2M -- 3.6 Architecture and Components of M2M -- 3.7 M2M Application Communication Principles -- 3.8 Issues/Concerns in M2M -- 3.9 Standardization Efforts for M2M -- 3.10 Conclusion -- 4 Network Architecture for IoT -- 4.1 Introduction -- 4.2 Network Terminology -- 4.3 ISO-OSI Reference Model -- 4.4 Network Protocols -- 4.5 WAN Architecture -- 4.6 MAC Source Address -- 4.7 Data Reception -- 4.8 Multiprotocol Label Switching -- 4.9 Data Center -- 4.10 Data Center Networking -- 4.11 IoT Gateways -- 4.12 Conclusion -- 5 IoT Hardware Design Fundamentals -- 5.1 Introduction -- 5.2 Hardware System Requirements -- 5.3 Hardware Functional Specifications -- 5.4 Software Functional Specifications -- 5.5 Hardware Component Selection -- 5.6 Design for Manufacturability -- 5.7 Design for Testability -- 5.8 Schematics, Layout, and Gerbers -- 5.9 PCB Fabrication and Assembly -- 5.10 Summarizing HW Design Flow -- 5.11 Applying Learnings to Connected Vehicle Use Case -- 5.12 Examples of Commercially Available IoT Devices -- 5.13 Standards Used in HW Component Configurations -- 5.14 Selection of Network Hardware for IoT Applications -- 5.15 IoT Hardware Security -- 5.16 Conclusion -- 6 IoT Data Systems Design -- 6.1 Introduction -- 6.2 IoT Data System -- 6.3 Value Chain Activity Generates Data -- 6.4 Operational Data: Sensors and Devices -- 6.5 Business and Customer/User Data -- 6.6 Intersection of Operational Data and Business Data -- 6.7 Structured and Unstructured Data -- 6.8 Data Systems Design -- 6.9 Data Transport -- 6.10 Data Collection -- 6.11 Data Storage -- 6.12 Data Preparation -- 6.13 Organizing Data for Analytics -- 6.14 Data Lake, Data Warehouses, and Efficient Access to Data -- 6.15 Analytics and Business Intelligence -- 6.16 Data Science and IoT -- 6.17 Machine Learning -- 6.18 Putting It Together to Build an IoT Data System -- 6.19 Applying Learnings to Connected Vehicle Use Case -- 6.20 Conclusion -- 7 IoT: Designing with Trust and Security -- 7.1 Introduction -- 7.2 Need for a Secure IoT System -- 7.3 Requirements for Secure IoT System -- 7.4 IoT Device Security -- 7.5 Trusted IoT Device -- 7.6 Trusted Device Identity -- 7.7 IoT Device Secure Storage -- 7.8 Secure Boot and Trusted Execution Environment -- 7.9 Secure Root of Trust -- 7.10 Trustworthy Firmware and Software -- 7.11 Public Key Infrastructure -- 7.12 Trusted Supply Chain -- 7.13 Secure Random Number Generator -- 7.14 IoT D2X (Device to X) Communication Security -- 7.15 Mutually Authenticated Endpoints -- 7.16 Secure Communication Channel and End-to-End Message Integrity -- 7.17 Secure Monitoring Systems -- 7.18 IoT Device to Cloud Security -- 7.19 IoT Data Security Policies and Regulations -- 7.20 IoT Trusted Platform -- 7.21 Secure Authentication -- 7.22 End-to-End Security (Including Third Parties) -- 7.23 Applying Learnings to Connected Vehicle Use Case -- 7.24 Conclusion -- Appendix: IoT Cybersecurity Threats and Risks Review Sample -- 8 Automation -- 8.1 Introduction -- 8.2 IoT Device Life Cycle Management -- 8.3 Zero Touch IoT Devices -- 8.4 Plug and Play IoT Devices -- 8.5 IoT SIM Cards and Management -- 8.6 Commercially Available IoT Control Software -- 8.7 Secure Automation of IoT Network Infrastructure -- 8.8 IoT Application Software Design Principles -- 8.9 Cloud Native Software -- 8.10 Automation of Value Chain Workflows -- 8.11 Edge Computing and Cloud Computing -- 8.12 Applying Learnings to Connected Vehicle Use Case -- 8.13 Conclusion -- 9 IoT Use Cases Across Industries -- 9.1 Introduction -- 9.2 Manufacturing Sector -- 9.3 Connected Vehicles -- 9.4 Seaport Automation -- 9.5 Airport Automation -- 9.6 Drones for Medical/Healthcare Systems -- 9.7 IoT Application in Oil and Natural Gas Industry -- 9.8 Conclusion -- 10 IoT Use Case Exercises -- 10.1 Banking Sector/Bank of Things -- 10.2 Agriculture?Agri of Things -- 10.3 Enhanced Smart Home (Home Automation) -- 10.4 Smart Manufacturing -- 10.5 Internet of Medical Things (IoMT) -- 10.6 Smart City with Smart Vehicles and Smart Home -- 10.7 Smart Grid -- References -- Index
Bibliography Includes bibliographical references and index
Notes E-Publication PDF
Subject Internet of things -- Security measures
Form Electronic book
Author Gambheer, Ramachandra, author
Vohra, Meenakshi, author
ISBN 9781260463101
1260463109