Preface |
|
13 | (2) |
1 Internet of Things Today |
|
15 | (26) |
|
1.1 Introduction: Key Trends |
|
|
15 | (4) |
|
1.2 Application Landscape for IoT |
|
|
19 | (4) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
1.2.4 IoT for the Supply Chain |
|
|
22 | (1) |
|
|
23 | (5) |
|
|
24 | (1) |
|
1.3.2 Local Sensor Networks |
|
|
25 | (1) |
|
|
25 | (1) |
|
1.3.4 Cloud Connectivity Networks |
|
|
26 | (1) |
|
|
26 | (2) |
|
|
28 | (4) |
|
1.5 Challenges and Open Problems |
|
|
32 | (4) |
|
|
32 | (1) |
|
1.5.2 Security and Privacy |
|
|
33 | (1) |
|
1.5.3 Context-Aware Analytics |
|
|
34 | (1) |
|
1.5.4 Affordable Implementation and Deployment |
|
|
34 | (1) |
|
1.5.5 Ease and Economy of Development |
|
|
35 | (1) |
|
1.5.6 Realistic Deployments |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (2) |
|
|
38 | (3) |
2 Scalability of Networks and Computing |
|
41 | (32) |
|
|
41 | (1) |
|
2.2 Use Cases and Requirements |
|
|
42 | (5) |
|
2.2.1 Smart Transportation |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
2.2.5 Smart Security and Surveillance |
|
|
45 | (1) |
|
2.2.6 Smart Retail and Logistics |
|
|
45 | (1) |
|
2.2.7 Smart Manufacturing |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
2.3 Application Classification Templates |
|
|
47 | (2) |
|
2.4 Communication Technologies for IoT |
|
|
49 | (7) |
|
2.4.1 Personal/Local Area Network Technologies |
|
|
50 | (3) |
|
2.4.2 Technologies for Low-Power Wide Area Networks (LPWAN) |
|
|
53 | (1) |
|
2.4.3 Cellular Technology for IoT |
|
|
54 | (1) |
|
2.4.4 Application-Level Protocols |
|
|
55 | (1) |
|
2.5 Scalable Network Architectures for IoT |
|
|
56 | (6) |
|
|
57 | (1) |
|
2.5.2 IoT Protocol Design Space |
|
|
58 | (1) |
|
2.5.3 Delay-Tolerant Networks |
|
|
58 | (2) |
|
2.5.4 Software-Defined Networking (SDN) |
|
|
60 | (2) |
|
2.6 Practical Considerations for Scalable IoT System Implementation |
|
|
62 | (5) |
|
2.6.1 Real-Time and Power Considerations for IoT Applications |
|
|
62 | (2) |
|
2.6.2 Utilizing the Edge Devices for Computing |
|
|
64 | (1) |
|
2.6.3 Need for a Platform for Application Development and Deployment |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (5) |
3 Security and Privacy |
|
73 | (36) |
|
3.1 IoT Security: A Perspective |
|
|
73 | (2) |
|
3.1.1 Business Objectives of Security |
|
|
75 | (1) |
|
3.2 IoT Security: Key Requirements |
|
|
75 | (4) |
|
3.3 IoT Security Challenges |
|
|
79 | (2) |
|
3.3.1 Typical Threats on Various IoT Subsystems |
|
|
80 | (1) |
|
|
81 | (2) |
|
3.5 Communication Security |
|
|
83 | (3) |
|
3.5.1 Cryptographic Key Management |
|
|
84 | (2) |
|
3.6 Identities and Identity Management |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
3.9 Secure Software Updates |
|
|
89 | (1) |
|
3.10 Privacy in IoT Systems |
|
|
90 | (2) |
|
3.11 System-Level Security Assessment |
|
|
92 | (8) |
|
3.11.1 Risk-Based Security |
|
|
92 | (2) |
|
3.11.2 Threat Modeling and Risk Estimation |
|
|
94 | (6) |
|
3.12 IoT Security: Practical Guidelines |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (4) |
4 Sensor Informatics and Business Insights |
|
109 | (26) |
|
|
109 | (2) |
|
4.2 Sensor Signal Processing |
|
|
111 | (8) |
|
4.2.1 Signal Acquisition and Conditioning |
|
|
111 | (3) |
|
4.2.2 Signal Representation |
|
|
114 | (2) |
|
4.2.3 Feature Extraction and Inference |
|
|
116 | (3) |
|
4.3 Semantic Interpretation of Processed Information |
|
|
119 | (7) |
|
|
119 | (4) |
|
|
123 | (1) |
|
|
124 | (2) |
|
4.4 Business Insights from Interpreted Knowledge |
|
|
126 | (2) |
|
|
126 | (1) |
|
4.4.2 Modeling and Simulation |
|
|
127 | (1) |
|
4.4.3 Optimization and Planning |
|
|
127 | (1) |
|
4.5 Data and Algorithm Marketplaces as New Business Models |
|
|
128 | (1) |
|
|
129 | (3) |
|
|
132 | (3) |
5 Mobile Sensing |
|
135 | (22) |
|
|
135 | (1) |
|
5.2 Applications and Use Cases for Mobile Sensing |
|
|
136 | (7) |
|
5.2.1 Mobile Sensing for Environmental Monitoring |
|
|
137 | (1) |
|
5.2.2 Mobile Sensing for Emergency Response |
|
|
137 | (1) |
|
5.2.3 Collaborative Sensing for Urban Transportation |
|
|
138 | (1) |
|
5.2.4 Robots in Healthcare |
|
|
138 | (1) |
|
5.2.5 Robotic Telesensing and Operation |
|
|
138 | (1) |
|
5.2.6 Aerial Robots for Spatial Intelligence |
|
|
139 | (4) |
|
5.3 Technologies and Challenges in Mobile Sensing |
|
|
143 | (9) |
|
5.3.1 Smartphone-Based Sensing |
|
|
143 | (4) |
|
5.3.2 Robotic Sensor Networks |
|
|
147 | (2) |
|
5.3.3 UAV for Aerial Mapping |
|
|
149 | (3) |
|
5.4 Economics of Mobile Sensing |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
6 Democratizing Analytics: Analytics as a Service |
|
157 | (20) |
|
6.1 The Need for IoT Analytics |
|
|
157 | (4) |
|
6.2 The Need for Analytics as a Service |
|
|
161 | (4) |
|
6.3 Analytics as a Service for Developers: Model-Driven IoT |
|
|
165 | (3) |
|
6.4 An Example of a Model-Driven IoT Framework |
|
|
168 | (4) |
|
|
168 | (1) |
|
6.4.2 Development and Orchestration Concern |
|
|
169 | (2) |
|
6.4.3 Infrastructure Concern |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (3) |
7 The Real Internet of Things and Beyond |
|
177 | (16) |
|
7.1 Realistic Internet of Things |
|
|
177 | (4) |
|
7.1.1 Key Contributing Factors to Real IoT |
|
|
178 | (3) |
|
7.2 Real IoT Is a Network of Trade-Offs |
|
|
181 | (5) |
|
7.2.1 Some of the Common Trade-Offs Encountered in IoT Systems and Applications |
|
|
182 | (2) |
|
7.2.2 Safety on the Machine Floor: An Illustrative Example |
|
|
184 | (2) |
|
7.3 Drivers for the Next Wave of IoT |
|
|
186 | (4) |
|
7.3.1 Resilient IoT Systems |
|
|
186 | (1) |
|
|
187 | (1) |
|
7.3.3 Impact of 5G as the Next Wave of Communication Technology in IoT |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
About the Authors |
|
193 | (2) |
Index |
|
195 | |