Sumeet Arora, Ramachandra Gambheer, Meenakshi Vohra
Design of Secure Iot Systems: A Practical Approach Across Industries
Sumeet Arora, Ramachandra Gambheer, Meenakshi Vohra
Design of Secure Iot Systems: A Practical Approach Across Industries
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product Build secure IoT devices and networks for a wide range of industries This practical guide fully explains the technology behind the Internet of Things, machine-to-machine communication, and automation. Written by a team of experts from leading firms, Design of Secure IoT Systems: A Practical Approach Across Industries covers all aspects of system architecture, protocols, requirements, and design. You will…mehr
Andere Kunden interessierten sich auch für
- M J RobertsSignals and Systems: Analysis Using Transform Methods & MATLAB156,99 €
- Information Systems and Management in Media and Entertainment Industries103,99 €
- Wai-Kai ChenLinear Networks and Systems: Algorithms and Computer-Aided Implementations (2nd Edition) (in 2 Volumes)108,99 €
- AnonymousCryptocurrencies in the Industrial Context. The Usage of IOTA in Different Industries17,95 €
- Automated Invention for Smart Industries37,99 €
- Adrian BilanConfident UX12,99 €
- Modelling Biological Systems: A Computational Approach143,99 €
-
-
-
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product Build secure IoT devices and networks for a wide range of industries This practical guide fully explains the technology behind the Internet of Things, machine-to-machine communication, and automation. Written by a team of experts from leading firms, Design of Secure IoT Systems: A Practical Approach Across Industries covers all aspects of system architecture, protocols, requirements, and design. You will discover how to design and engineer IoT devices and networks with trust and security. The book features industrial automation case studies and simulation examples from a wide range of fields. Coverage includes: * IoT architecture and technology fundamentals * Connected machines and M2M communication * Network protocols and architecture * IoT hardware design fundamentals * WAN, IP, and MAC configuration * IoT data systems design * Designing with trust and security * Data security policies and regulations * Cybersecurity threats and risks * Automation * Use cases across industries * Industry compliance and standards
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: McGraw Hill LLC
- Seitenzahl: 224
- Erscheinungstermin: 15. Juli 2021
- Englisch
- Abmessung: 239mm x 192mm x 17mm
- Gewicht: 550g
- ISBN-13: 9781260463095
- ISBN-10: 1260463095
- Artikelnr.: 60006061
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: McGraw Hill LLC
- Seitenzahl: 224
- Erscheinungstermin: 15. Juli 2021
- Englisch
- Abmessung: 239mm x 192mm x 17mm
- Gewicht: 550g
- ISBN-13: 9781260463095
- ISBN-10: 1260463095
- Artikelnr.: 60006061
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Sumeet Arora is Chief Development Officer at ThoughtSpot Inc., an enterprise in the data analytics market segment, with the mission of helping create a more fact-driven world by leveraging search and AI to bring insights and analytics to every knowledge worker. Prior to joining ThoughtSpot, Arora was Senior Vice President and General Manager of Service Provider Networking at Cisco Systems Inc. In this role, he led the engineering, development, and product management team for the networking/routing portfolio aimed at the global service provider segment. Ramachandra Gambheer is Senior Technical and Business Operations Manager at Cisco Systems Inc. He has 30 years of overall experience in the field of hardware systems design, IoT, high volume hardware test automation and has published several papers in national and international journals. He has designed several FPGA based embedded systems for various industries including machine vision. He is an alumni and also former faculty member of NITK (KREC), Surathkal. Meenakshi Vohra is a security professional with experience working at companies such as Uber Technologies, VMware, Lockheed Martin, Symantec, and various startups. Vohra has implemented security protocols across embedded platforms, cloud software systems, as well as for edge systems such as autonomous vehicles including self-driving cars, drones, air taxis, bikes, and scooters. She has over 20 years of experience in network and software product development. Vohra holds a bachelor's degree in computer science and a master's degree in networking and security.
Preface
1 Evolution of IoT
1.1 Introduction to Digital Transformation
1.2 Connected Value Chain
1.3 What Is Digital Transformation?
1.4 Introduction to IoT
1.5 Building Blocks of IoT System
1.6 Evolution of IoT
1.7 Connected Vehicle Use Case
1.8 Chapters Overview
2 IoT Architecture and Technology Essentials
2.1 Introduction
2.2 IoT System Architecture
2.3 IoT Technology and Protocols
2.4 Applying Learnings to Connected Vehicle Use Case
2.5 Conclusion
3 Connected Machines
3.1 Introduction
3.2 Machine-to-Machine (M2M) Segments
3.3 M2M Communication
3.4 Applications of M2M
3.5 Key Features of M2M
3.6 Architecture and Components of M2M
3.7 M2M Application Communication Principles
3.8 Issues/Concerns in M2M
3.9 Standardization Efforts for M2M
3.10 Conclusion
4 Network Architecture for IoT
4.1 Introduction
4.2 Network Terminology
4.3 ISO-OSI Reference Model
4.4 Network Protocols
4.5 WAN Architecture
4.6 MAC Source Address
4.7 Data Reception
4.8 Multiprotocol Label Switching
4.9 Data Center
4.10 Data Center Networking
4.11 IoT Gateways
4.12 Conclusion
5 IoT Hardware Design Fundamentals
5.1 Introduction
5.2 Hardware System Requirements
5.3 Hardware Functional Specifications
5.4 Software Functional Specifications
5.5 Hardware Component Selection
5.6 Design for Manufacturability
5.7 Design for Testability
5.8 Schematics, Layout, and Gerbers
5.9 PCB Fabrication and Assembly
5.10 Summarizing HW Design Flow
5.11 Applying Learnings to Connected Vehicle Use Case
5.12 Examples of Commercially Available IoT Devices
5.13 Standards Used in HW Component Configurations
5.14 Selection of Network Hardware for IoT Applications
5.15 IoT Hardware Security
5.16 Conclusion
6 IoT Data Systems Design
6.1 Introduction
6.2 IoT Data System
6.3 Value Chain Activity Generates Data
6.4 Operational Data: Sensors and Devices
6.5 Business and Customer/User Data
6.6 Intersection of Operational Data and Business Data
6.7 Structured and Unstructured Data
6.8 Data Systems Design
6.9 Data Transport
6.10 Data Collection
6.11 Data Storage
6.12 Data Preparation
6.13 Organizing Data for Analytics
6.14 Data Lake, Data Warehouses, and Efficient Access to Data
6.15 Analytics and Business Intelligence
6.16 Data Science and IoT
6.17 Machine Learning
6.18 Putting It Together to Build an IoT Data System
6.19 Applying Learnings to Connected Vehicle Use Case
6.20 Conclusion
7 IoT: Designing with Trust and Security
7.1 Introduction
7.2 Need for a Secure IoT System
7.3 Requirements for Secure IoT System
7.4 IoT Device Security
7.5 Trusted IoT Device
7.6 Trusted Device Identity
7.7 IoT Device Secure Storage
7.8 Secure Boot and Trusted Execution Environment
7.9 Secure Root of Trust
7.10 Trustworthy Firmware and Software
7.11 Public Key Infrastructure
7.12 Trusted Supply Chain
7.13 Secure Random Number Generator
7.14 IoT D2X (Device to X) Communication Security
7.15 Mutually Authenticated Endpoints
7.16 Secure Communication Channel and End-to-End Message Integrity
7.17 Secure Monitoring Systems
7.18 IoT Device to Cloud Security
7.19 IoT Data Security Policies and Regulations
7.20 IoT Trusted Platform
7.21 Secure Authentication
7.22 End-to-End Security (Including Third Parties)
7.23 Applying Learnings to Connected Vehicle Use Case
7.24 Conclusion
Appendix: IoT Cybersecurity Threats and Risks Review Sample
8 Automation
8.1 Introduction
8.2 IoT Device Life Cycle Management
8.3 Zero Touch IoT Devices
8.4 Plug and Play IoT Devices
8.5 IoT SIM Cards and Management
8.6 Commercially Available IoT Control Software
8.7 Secure Automation of IoT Network Infrastructure
8.8 IoT Application Software Design Principles
8.9 Cloud Native Software
8.10 Automation of Value Chain Workflows
8.11 Edge Computing and Cloud Computing
8.12 Applying Learnings to Connected Vehicle Use Case
8.13 Conclusion
9 IoT Use Cases Across Industries
9.1 Introduction
9.2 Manufacturing Sector
9.3 Connected Vehicles
9.4 Seaport Automation
9.5 Airport Automation
9.6 Drones for Medical/Healthcare Systems
9.7 IoT Application in Oil and Natural Gas Industry
9.8 Conclusion
10 IoT Use Case Exercises
10.1 Banking Sector/Bank of Things
10.2 Agriculture-Agri of Things
10.3 Enhanced Smart Home (Home Automation)
10.4 Smart Manufacturing
10.5 Internet of Medical Things (IoMT)
10.6 Smart City with Smart Vehicles and Smart Home
10.7 Smart Grid
References
Index
1 Evolution of IoT
1.1 Introduction to Digital Transformation
1.2 Connected Value Chain
1.3 What Is Digital Transformation?
1.4 Introduction to IoT
1.5 Building Blocks of IoT System
1.6 Evolution of IoT
1.7 Connected Vehicle Use Case
1.8 Chapters Overview
2 IoT Architecture and Technology Essentials
2.1 Introduction
2.2 IoT System Architecture
2.3 IoT Technology and Protocols
2.4 Applying Learnings to Connected Vehicle Use Case
2.5 Conclusion
3 Connected Machines
3.1 Introduction
3.2 Machine-to-Machine (M2M) Segments
3.3 M2M Communication
3.4 Applications of M2M
3.5 Key Features of M2M
3.6 Architecture and Components of M2M
3.7 M2M Application Communication Principles
3.8 Issues/Concerns in M2M
3.9 Standardization Efforts for M2M
3.10 Conclusion
4 Network Architecture for IoT
4.1 Introduction
4.2 Network Terminology
4.3 ISO-OSI Reference Model
4.4 Network Protocols
4.5 WAN Architecture
4.6 MAC Source Address
4.7 Data Reception
4.8 Multiprotocol Label Switching
4.9 Data Center
4.10 Data Center Networking
4.11 IoT Gateways
4.12 Conclusion
5 IoT Hardware Design Fundamentals
5.1 Introduction
5.2 Hardware System Requirements
5.3 Hardware Functional Specifications
5.4 Software Functional Specifications
5.5 Hardware Component Selection
5.6 Design for Manufacturability
5.7 Design for Testability
5.8 Schematics, Layout, and Gerbers
5.9 PCB Fabrication and Assembly
5.10 Summarizing HW Design Flow
5.11 Applying Learnings to Connected Vehicle Use Case
5.12 Examples of Commercially Available IoT Devices
5.13 Standards Used in HW Component Configurations
5.14 Selection of Network Hardware for IoT Applications
5.15 IoT Hardware Security
5.16 Conclusion
6 IoT Data Systems Design
6.1 Introduction
6.2 IoT Data System
6.3 Value Chain Activity Generates Data
6.4 Operational Data: Sensors and Devices
6.5 Business and Customer/User Data
6.6 Intersection of Operational Data and Business Data
6.7 Structured and Unstructured Data
6.8 Data Systems Design
6.9 Data Transport
6.10 Data Collection
6.11 Data Storage
6.12 Data Preparation
6.13 Organizing Data for Analytics
6.14 Data Lake, Data Warehouses, and Efficient Access to Data
6.15 Analytics and Business Intelligence
6.16 Data Science and IoT
6.17 Machine Learning
6.18 Putting It Together to Build an IoT Data System
6.19 Applying Learnings to Connected Vehicle Use Case
6.20 Conclusion
7 IoT: Designing with Trust and Security
7.1 Introduction
7.2 Need for a Secure IoT System
7.3 Requirements for Secure IoT System
7.4 IoT Device Security
7.5 Trusted IoT Device
7.6 Trusted Device Identity
7.7 IoT Device Secure Storage
7.8 Secure Boot and Trusted Execution Environment
7.9 Secure Root of Trust
7.10 Trustworthy Firmware and Software
7.11 Public Key Infrastructure
7.12 Trusted Supply Chain
7.13 Secure Random Number Generator
7.14 IoT D2X (Device to X) Communication Security
7.15 Mutually Authenticated Endpoints
7.16 Secure Communication Channel and End-to-End Message Integrity
7.17 Secure Monitoring Systems
7.18 IoT Device to Cloud Security
7.19 IoT Data Security Policies and Regulations
7.20 IoT Trusted Platform
7.21 Secure Authentication
7.22 End-to-End Security (Including Third Parties)
7.23 Applying Learnings to Connected Vehicle Use Case
7.24 Conclusion
Appendix: IoT Cybersecurity Threats and Risks Review Sample
8 Automation
8.1 Introduction
8.2 IoT Device Life Cycle Management
8.3 Zero Touch IoT Devices
8.4 Plug and Play IoT Devices
8.5 IoT SIM Cards and Management
8.6 Commercially Available IoT Control Software
8.7 Secure Automation of IoT Network Infrastructure
8.8 IoT Application Software Design Principles
8.9 Cloud Native Software
8.10 Automation of Value Chain Workflows
8.11 Edge Computing and Cloud Computing
8.12 Applying Learnings to Connected Vehicle Use Case
8.13 Conclusion
9 IoT Use Cases Across Industries
9.1 Introduction
9.2 Manufacturing Sector
9.3 Connected Vehicles
9.4 Seaport Automation
9.5 Airport Automation
9.6 Drones for Medical/Healthcare Systems
9.7 IoT Application in Oil and Natural Gas Industry
9.8 Conclusion
10 IoT Use Case Exercises
10.1 Banking Sector/Bank of Things
10.2 Agriculture-Agri of Things
10.3 Enhanced Smart Home (Home Automation)
10.4 Smart Manufacturing
10.5 Internet of Medical Things (IoMT)
10.6 Smart City with Smart Vehicles and Smart Home
10.7 Smart Grid
References
Index
Preface
1 Evolution of IoT
1.1 Introduction to Digital Transformation
1.2 Connected Value Chain
1.3 What Is Digital Transformation?
1.4 Introduction to IoT
1.5 Building Blocks of IoT System
1.6 Evolution of IoT
1.7 Connected Vehicle Use Case
1.8 Chapters Overview
2 IoT Architecture and Technology Essentials
2.1 Introduction
2.2 IoT System Architecture
2.3 IoT Technology and Protocols
2.4 Applying Learnings to Connected Vehicle Use Case
2.5 Conclusion
3 Connected Machines
3.1 Introduction
3.2 Machine-to-Machine (M2M) Segments
3.3 M2M Communication
3.4 Applications of M2M
3.5 Key Features of M2M
3.6 Architecture and Components of M2M
3.7 M2M Application Communication Principles
3.8 Issues/Concerns in M2M
3.9 Standardization Efforts for M2M
3.10 Conclusion
4 Network Architecture for IoT
4.1 Introduction
4.2 Network Terminology
4.3 ISO-OSI Reference Model
4.4 Network Protocols
4.5 WAN Architecture
4.6 MAC Source Address
4.7 Data Reception
4.8 Multiprotocol Label Switching
4.9 Data Center
4.10 Data Center Networking
4.11 IoT Gateways
4.12 Conclusion
5 IoT Hardware Design Fundamentals
5.1 Introduction
5.2 Hardware System Requirements
5.3 Hardware Functional Specifications
5.4 Software Functional Specifications
5.5 Hardware Component Selection
5.6 Design for Manufacturability
5.7 Design for Testability
5.8 Schematics, Layout, and Gerbers
5.9 PCB Fabrication and Assembly
5.10 Summarizing HW Design Flow
5.11 Applying Learnings to Connected Vehicle Use Case
5.12 Examples of Commercially Available IoT Devices
5.13 Standards Used in HW Component Configurations
5.14 Selection of Network Hardware for IoT Applications
5.15 IoT Hardware Security
5.16 Conclusion
6 IoT Data Systems Design
6.1 Introduction
6.2 IoT Data System
6.3 Value Chain Activity Generates Data
6.4 Operational Data: Sensors and Devices
6.5 Business and Customer/User Data
6.6 Intersection of Operational Data and Business Data
6.7 Structured and Unstructured Data
6.8 Data Systems Design
6.9 Data Transport
6.10 Data Collection
6.11 Data Storage
6.12 Data Preparation
6.13 Organizing Data for Analytics
6.14 Data Lake, Data Warehouses, and Efficient Access to Data
6.15 Analytics and Business Intelligence
6.16 Data Science and IoT
6.17 Machine Learning
6.18 Putting It Together to Build an IoT Data System
6.19 Applying Learnings to Connected Vehicle Use Case
6.20 Conclusion
7 IoT: Designing with Trust and Security
7.1 Introduction
7.2 Need for a Secure IoT System
7.3 Requirements for Secure IoT System
7.4 IoT Device Security
7.5 Trusted IoT Device
7.6 Trusted Device Identity
7.7 IoT Device Secure Storage
7.8 Secure Boot and Trusted Execution Environment
7.9 Secure Root of Trust
7.10 Trustworthy Firmware and Software
7.11 Public Key Infrastructure
7.12 Trusted Supply Chain
7.13 Secure Random Number Generator
7.14 IoT D2X (Device to X) Communication Security
7.15 Mutually Authenticated Endpoints
7.16 Secure Communication Channel and End-to-End Message Integrity
7.17 Secure Monitoring Systems
7.18 IoT Device to Cloud Security
7.19 IoT Data Security Policies and Regulations
7.20 IoT Trusted Platform
7.21 Secure Authentication
7.22 End-to-End Security (Including Third Parties)
7.23 Applying Learnings to Connected Vehicle Use Case
7.24 Conclusion
Appendix: IoT Cybersecurity Threats and Risks Review Sample
8 Automation
8.1 Introduction
8.2 IoT Device Life Cycle Management
8.3 Zero Touch IoT Devices
8.4 Plug and Play IoT Devices
8.5 IoT SIM Cards and Management
8.6 Commercially Available IoT Control Software
8.7 Secure Automation of IoT Network Infrastructure
8.8 IoT Application Software Design Principles
8.9 Cloud Native Software
8.10 Automation of Value Chain Workflows
8.11 Edge Computing and Cloud Computing
8.12 Applying Learnings to Connected Vehicle Use Case
8.13 Conclusion
9 IoT Use Cases Across Industries
9.1 Introduction
9.2 Manufacturing Sector
9.3 Connected Vehicles
9.4 Seaport Automation
9.5 Airport Automation
9.6 Drones for Medical/Healthcare Systems
9.7 IoT Application in Oil and Natural Gas Industry
9.8 Conclusion
10 IoT Use Case Exercises
10.1 Banking Sector/Bank of Things
10.2 Agriculture-Agri of Things
10.3 Enhanced Smart Home (Home Automation)
10.4 Smart Manufacturing
10.5 Internet of Medical Things (IoMT)
10.6 Smart City with Smart Vehicles and Smart Home
10.7 Smart Grid
References
Index
1 Evolution of IoT
1.1 Introduction to Digital Transformation
1.2 Connected Value Chain
1.3 What Is Digital Transformation?
1.4 Introduction to IoT
1.5 Building Blocks of IoT System
1.6 Evolution of IoT
1.7 Connected Vehicle Use Case
1.8 Chapters Overview
2 IoT Architecture and Technology Essentials
2.1 Introduction
2.2 IoT System Architecture
2.3 IoT Technology and Protocols
2.4 Applying Learnings to Connected Vehicle Use Case
2.5 Conclusion
3 Connected Machines
3.1 Introduction
3.2 Machine-to-Machine (M2M) Segments
3.3 M2M Communication
3.4 Applications of M2M
3.5 Key Features of M2M
3.6 Architecture and Components of M2M
3.7 M2M Application Communication Principles
3.8 Issues/Concerns in M2M
3.9 Standardization Efforts for M2M
3.10 Conclusion
4 Network Architecture for IoT
4.1 Introduction
4.2 Network Terminology
4.3 ISO-OSI Reference Model
4.4 Network Protocols
4.5 WAN Architecture
4.6 MAC Source Address
4.7 Data Reception
4.8 Multiprotocol Label Switching
4.9 Data Center
4.10 Data Center Networking
4.11 IoT Gateways
4.12 Conclusion
5 IoT Hardware Design Fundamentals
5.1 Introduction
5.2 Hardware System Requirements
5.3 Hardware Functional Specifications
5.4 Software Functional Specifications
5.5 Hardware Component Selection
5.6 Design for Manufacturability
5.7 Design for Testability
5.8 Schematics, Layout, and Gerbers
5.9 PCB Fabrication and Assembly
5.10 Summarizing HW Design Flow
5.11 Applying Learnings to Connected Vehicle Use Case
5.12 Examples of Commercially Available IoT Devices
5.13 Standards Used in HW Component Configurations
5.14 Selection of Network Hardware for IoT Applications
5.15 IoT Hardware Security
5.16 Conclusion
6 IoT Data Systems Design
6.1 Introduction
6.2 IoT Data System
6.3 Value Chain Activity Generates Data
6.4 Operational Data: Sensors and Devices
6.5 Business and Customer/User Data
6.6 Intersection of Operational Data and Business Data
6.7 Structured and Unstructured Data
6.8 Data Systems Design
6.9 Data Transport
6.10 Data Collection
6.11 Data Storage
6.12 Data Preparation
6.13 Organizing Data for Analytics
6.14 Data Lake, Data Warehouses, and Efficient Access to Data
6.15 Analytics and Business Intelligence
6.16 Data Science and IoT
6.17 Machine Learning
6.18 Putting It Together to Build an IoT Data System
6.19 Applying Learnings to Connected Vehicle Use Case
6.20 Conclusion
7 IoT: Designing with Trust and Security
7.1 Introduction
7.2 Need for a Secure IoT System
7.3 Requirements for Secure IoT System
7.4 IoT Device Security
7.5 Trusted IoT Device
7.6 Trusted Device Identity
7.7 IoT Device Secure Storage
7.8 Secure Boot and Trusted Execution Environment
7.9 Secure Root of Trust
7.10 Trustworthy Firmware and Software
7.11 Public Key Infrastructure
7.12 Trusted Supply Chain
7.13 Secure Random Number Generator
7.14 IoT D2X (Device to X) Communication Security
7.15 Mutually Authenticated Endpoints
7.16 Secure Communication Channel and End-to-End Message Integrity
7.17 Secure Monitoring Systems
7.18 IoT Device to Cloud Security
7.19 IoT Data Security Policies and Regulations
7.20 IoT Trusted Platform
7.21 Secure Authentication
7.22 End-to-End Security (Including Third Parties)
7.23 Applying Learnings to Connected Vehicle Use Case
7.24 Conclusion
Appendix: IoT Cybersecurity Threats and Risks Review Sample
8 Automation
8.1 Introduction
8.2 IoT Device Life Cycle Management
8.3 Zero Touch IoT Devices
8.4 Plug and Play IoT Devices
8.5 IoT SIM Cards and Management
8.6 Commercially Available IoT Control Software
8.7 Secure Automation of IoT Network Infrastructure
8.8 IoT Application Software Design Principles
8.9 Cloud Native Software
8.10 Automation of Value Chain Workflows
8.11 Edge Computing and Cloud Computing
8.12 Applying Learnings to Connected Vehicle Use Case
8.13 Conclusion
9 IoT Use Cases Across Industries
9.1 Introduction
9.2 Manufacturing Sector
9.3 Connected Vehicles
9.4 Seaport Automation
9.5 Airport Automation
9.6 Drones for Medical/Healthcare Systems
9.7 IoT Application in Oil and Natural Gas Industry
9.8 Conclusion
10 IoT Use Case Exercises
10.1 Banking Sector/Bank of Things
10.2 Agriculture-Agri of Things
10.3 Enhanced Smart Home (Home Automation)
10.4 Smart Manufacturing
10.5 Internet of Medical Things (IoMT)
10.6 Smart City with Smart Vehicles and Smart Home
10.7 Smart Grid
References
Index