Internet of Everything: Key Technologies, Practical Applications and Security of IoT

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon.A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed.This book is a good reference guide for researchers, developers, integrators and stakeholders working on research in or development of IoT, particularly where open-source software are deployed.

Author(s): Hang Song
Publisher: World Scientific Publishing
Year: 2022

Language: English
Pages: 837
City: Singapore

Contents
Foreword by Yi Pan
Foreword by Jeng-Shyang Pan
Preface
About the Author
Acknowledgments
Chapter 1 What is IoT on Earth
1.1 Smart Coffee Pot
1.2 Implanted Tags
1.3 Electronic Toll Collection
1.4 Enlightens
Chapter 2 Development of Internet of Things
2.1 Formation of IoT Concepts
2.2 IoT and Human Society
2.2.1 Population and connected devices
2.2.2 Reflection on the unity of nature and human
2.2.3 IoT and sustainable development
2.3 Definition of the IoT at This Stage
2.4 Understanding IoE
2.4.1 IoE pyramid
2.4.2 IoT 2.0
2.5 Summary
Chapter 3 Characteristics of Internet of Things
3.1 Architecture of Internet of Things and Beyond
3.2 From Multi-Layers Technical Vision
3.3 Internet of Everything and Characteristics
3.3.1 IoT and Internet of Everything
3.3.2 Analysis of the characteristics towards IoE
3.4 Value Chain Towards an New Ecosystem
Chapter 4 Perceptual Technologies Layer of IoT
4.1 Identification and Recognition Technology
4.1.1 Automatic recognition technology
4.1.2 RFID
4.1.3 EPC system
4.1.4 The analysis of EPC security
4.2. Sensors and WSN
4.2.1 Introduction of sensor
4.2.2 Sensors and WSN
4.2.3 Novel sensor system and smart applications
4.2.4 Sensing technology and application
4.2.5 Sensing use case in AGV navigation
4.2.6 Security analysis of WSN
4.3 Biometric Identification Technology
4.3.1 Introduction to biometrics
4.3.2 Fingerprint and palm print recognition
4.3.3 Facial recognition
4.3.4 Eye and iris recognition
4.3.5 Behavior recognition and secure consideration
4.4 Interaction of H2M and IoT Senses (IoTS)
4.4.1 Touch
4.4.2 Sight of IoT
4.4.3 Auditory sense
4.4.4 Smell and taste
4.4.5 VR and AR
4.4.6 Sense of space
4.5 Location Awareness
4.5.1 GNSS and INS
4.5.2 Positioning in cellular network and assisted GPS
4.5.3 Node localization
4.5.4 Indoor positioning and beacon
4.5.5 Wi-Fi fingerprint and IMES
4.6 AI-related Sensing and Location
4.6.1 Machine vision
4.6.2 SLAM
4.7 Anomaly Detection Technology
Chapter 5 Communication Technologies Layer of IoT
5.1 Introduction
5.2 Wired and Wireless Access of IoT
5.2.1 Wired access
5.2.2 Wireless communications
5.2.3 Three basic prototypes of IoT communications
5.2.3.1 Point to point approach
5.2.3.2 Point to gateway
5.2.3.3 Point to cloud
5.3 WLAN and Wi-Fi 6
5.3.1 Wi-Fi and IEEE 802.11 standards
5.3.2 Wi-Fi 6 and IEEE 802.11ah
5.3.3 Ad hoc networks for WLAN
5.3.4 Access for WSN
5.4 IEEE 802.11p(DSRC) and VANETs
5.4.1 DSRC in VANETs
5.4.2 DSRC based V2X
5.5 WPAN/IEEE 802.15.4 and ZigBee
5.5.1 Introduction of IEEE 802.15.4
5.5.2 Zigbee
5.5.3 6LoWPAN
5.5.3.1 Wi-SUN and SUN
5.5.3.2 Comparison with IEEE 802.11ah and BLE
5.6 Gateways and Protocols
5.6.1 Gateways
5.6.1.1 Basic gateways
5.6.1.2 Cloud gateway
5.6.1.3 M2M gateways
5.6.1.4 Smart gateways
5.6.2 Protocols
5.6.3 Protocols of IETF IoT-Related WPAN
5.6.3.1 IETF LR-WPAN protocols and security aspects
5.6.3.2 6LoWPAN as an example of interworking
5.6.4 Proprietary LPWA
5.7 Cellular LPWAN and M2M in 5G Era
5.7.1 Cellular LPWAN
5.7.2 M2M in 5G era
5.7.3 M2M and CIoT
5.7.3.1 MTC in R11 and R12 of 3GPP
5.7.3.2 MTC service
5.7.4 ETSI M2M and OMA LwM2M
5.7.5 3GPP network enhancement for LPWANs
5.7.6 Summary of LPWAN standards
5.8 5G CIoT and Beyond
5.8.1 5G CIoT
5.8.2 Massive MTC
5.8.3 Slices for critical IoT/M2M
5.8.4 URLLC for critical IoT
5.8.4.1 IIoT enhancement
5.8.4.2 Integrated access and backhaul for coverage enhancement
5.8.4.3 NR TSC
5.8.5 ML as a service in NWDAF
5.9 Satellite IoT
5.9.1 Preparations for the edge and 5G
5.9.1.1 IIRA implementation viewpoint three-tier topology
5.9.1.2 5G edge computing enhancements
5.9.1.3 Introduction of satellite communication
5.9.2 Satellite-5G integration on the edge
5.9.2.1 Satellite integration into 3GPP network and SATis5 testbed
5.9.2.2 Mobile edge node demo: Connectivity on the move
5.9.3 Satellite–5G integration by the HAPS
5.9.3.1 Case 1 5G-gNB on the satellite or UAV
5.9.3.2 Case 2 hybrid relay nodes of sat. and HAPS, with the terrestrial 5G-gNB
5.9.4 Satellite constellations towards 6G
5.10 TIoT and IEEE P1918.1
5.10.1 IEEE P1918.1
5.10.1.1 Layered protocol stacks and interfaces (of O/S)
5.10.1.2 Access node side
5.10.1.3 Functional capabilities
5.10.2 TIoT and haptic codecs
5.10.3 ML as a service and 5G TSN
5.10.3.1 Network domain and edge computing
5.10.3.2 ML as-a-service and an use case in support engine
5.10.3.3 TIoT in B5G
5.10.3.4 TSN and 5G
Acknowledgements
Chapter 6 Services and Platform Layer of IoT
6.1 Middleware
6.1.1 SOA
6.1.1.1 SOA
6.1.1.2 Service generated scenarios: Primitive IoT and SOA
6.1.2 Middleware introduction
6.1.2.1 What is middleware
6.1.2.2 RFID middleware as an example of MoM middleware
6.1.3 IoT middleware
6.1.3.1 Introduction to IoT middleware and its requirements
6.1.3.2 DAM
6.1.3.3 ASM and use cases
6.1.3.4 Platforms of middleware
6.1.3.5 Other middlewares
6.1.4 OPC-UA as an industrial automation middleware
6.1.4.1 Introduction of web-based service and CoAP
6.1.4.2 OPC-UA
6.1.4.3 OPC-UA and DPWS
6.1.4.4 Services mediator as a middleware compliant to OPC-UA
6.1.5 Robot middleware
6.1.5.1 Overview of robot middleware
6.1.5.2 RT-middleware
6.1.5.3 ROS (robotic operating system) middleware
6.1.5.4 ROS2.0 with DDS supported real-time control
6.1.6 Security of middleware
6.1.6.1 Enlightenment from tuple-space middleware
6.1.6.2 Security in OPC-UA
6.1.6.3 Further research
6.2 Primitive IoT and IoT Grids
6.2.1 Introduction of primitive IoT and IoT grid
6.2.1.1 Things in primitive IoT (PIoT)
6.2.1.2 Characteristics of IoT grid composed by PIoT
6.2.1.3 An evolutionary view of PIoT, IoT grid and beyond
6.2.2 Use case: IoT grids in vehicles
6.2.2.1 Functions/Hardware-oriented grids and a bottom-up view
6.2.2.2 Service-Oriented grids and their top-down views
6.2.2.3 From domain to multi-domain
6.2.2.4 AUTOSAR software architecture in grid view
6.2.3 A grid view in industry sectors and RAMI 4.0
6.2.3.1 The value chain of two dimensional domain of grids
6.2.3.2 A Grid analysis of RAMI4.0 and IMSAs
6.2.3.3 IoT grids in the leveled IoT view
6.3 Cloud Computing
6.3.1 Cloud paradigm
6.3.2 Azure and Google clouds as examples
6.3.3 Collaborative cloud in industrial IoT sector
6.4 Edge Computing
6.4.1 Edge computing and fog computing
6.4.1.1 From cloud back to the edge of IoT
6.4.1.2 Edge and cloud/fog computing
6.4.1.3 What is edge computing
6.4.2 Requirement analysis and architecture of edge computing
6.4.2.1 Advantages of EC and its requirement for IoT
6.4.2.2 Hierarchical IoT with edge computing
6.4.2.3 The reference architectures of edge computing as RAM of EC
6.4.3 MEC and 5G
6.4.4 User cases of edge deployment of Azure
6.4.5 Use cases for smart driving and smart building
6.4.5.1 Transportation scenarios of ultra-reliability and low latency
6.4.5.2 Smart home and building with edge computing design
6.4.6 Further discussion
6.5 IoV(V2X) and Autonomous Driving Vehicles
6.5.1 LBS and IoV
6.5.2 Different stages of IoVs
6.5.3 C-V2X and DSRC
6.5.3.1 DSRC-based V2X
6.5.3.2 C-V2X of R14 in 3GPP
6.5.3.3 Comparison of DSRC and C-V2X from a technical view
6.5.3.4 Comparison between different countries and regions
6.5.4 IoV in 5G Era
6.5.4.1 5G fitting V2X by network slicing
6.5.4.2 A unified technology vision of IoV in 5G era
6.5.4.3 ITS vision of smart Columbus and Chinese CAV roadmap
6.5.4.4 5G-V2X use-cases
6.5.4.5 5G C-V2X as a new sensor for longer detection in uRLLC usages
6.5.4.6 Platooning and remote driving
6.5.4.7 Autonomous vehicle use-case
6.5.5 The security of IoV
6.5.5.1 Wi-Fi or can attacks to vehicles
6.5.5.2 Cracking on the Uconnected system
6.5.5.3 Security in V2X
6.6 IIoT and Smart Manufacturing
6.6.1 Introduction
6.6.2 Industrial IoT and I4.0
6.6.2.1 Industry 4.0
6.6.2.2 Vertical IIoT grids
6.6.3 The value chain of IIoT grids in IMSA
6.6.4 Healthy workforce: TRW use case as a safety grid
6.6.5 Further discussion
Chapter 7 Application Layer of IoT
7.1 Protocols of Applications
7.2 Digital Twin
7.2.1 Introduction
7.2.2 Characteristics of DT
7.2.3 IIoT and DT
7.2.4 Use cases
7.3 Applications in Smart Building and Smart Energy
7.3.1 Smart building
7.3.2 Smart energy
7.3.3 Energy internet and Internet of energy
7.4 Applications in Smart City
7.4.1 Resident grids in comprehensive views
7.4.2 Use cases of smart city
7.4.3 MONICA project
7.4.4 Blockchain on the IoT edge
7.5 Smart Agriculture
7.6 Application of TIoT
7.6.1 Finger kinesthetic perception schemes and AR
7.6.2 Inference as a ML service
7.6.3 TIoT and remote diagnosis
Chapter 8 IoT Security
8.1 Introduction
8.2 The Baseline of IoT Security
8.2.1 What is IoT security?
8.2.1.1 Empathy alike from human security necessary
8.2.1.2 IoT is the reflection on human social relations
8.2.1.3 Necessary security for harmonious coexistence between people and things
8.2.2 Insight and extension of IoT security
8.2.2.1 Extension of IoT security is that “things” is fully respected
8.2.2.2 Connotation: The information security and privacy protection of people involved in things
8.2.3 A layer model of IoT security
8.3 Security in Perception Layer
8.3.1 Perception security technology
8.3.1.1 Lightweight encryption
8.3.1.2 Signature and authentication
8.3.1.3 Watermark
8.3.2 Perception security strategy
8.3.2.1 Compressed sensing (CS) on data
8.3.2.2 Wiping scene mark
8.3.2.3 Discussion
8.4 Security in Networks and a Reference Architecture
8.4.1 A reference security architecture of IoT network layer
8.4.2 Security technology and mechanics
8.5 IoT Security and Secure Communication
8.5.1 Functional safety and security
8.5.2 Communication in safety/security
8.5.3 Secure network technologies
8.6 Security of Platform and Application
8.6.1 Platform security
8.6.2 Security of service and strategy management
8.6.2.1 Data protection and encryption
8.6.2.2 QoS
8.6.2.3 SLA
8.6.3 Security for applications layer
8.7 Cloud/Edge Security
8.7.1 Secure by design
8.7.1.1 Managing security risks at edge devices
8.7.1.2 Secure cloud infrastructure
8.7.2 Cloud and edge security policy and technology
8.7.2.1 SMC
8.7.3 Edge security model
8.7.3.1 Security grid elements and trust management
8.7.3.2 Trust management and rule on the edge
8.7.4 The rule training by federated learning model
8.7.4.1 The definition of federated learning
8.7.4.2 The classes of federated learning
8.7.4.3 The system architecture of federated learning
Acknowledgment
Appendix
Chapter 9 Conclusions and Expectations
Bibliography
Index