Internet of Things (IoT) products and cyber-physical systems (CPS) are being utilized in almost every discipline and there continues to be significant increases in spending on design, development, and deployment of IoT applications and analytics within every domain, from our homes, schools, government, and industry. This practical text provides an introduction to IoT that can be understood by every engineering discipline and discusses detailed applications of IoT. Developed to help engineers navigate this increasingly important and cross-disciplinary topic, this work:
- Offers research-based examples and case studies to facilitate the understanding of each IoT primitive
- Highlights IoT’s connection to blockchain
- Provides and understanding of benefits and challenges of IoT and its importance to a variety of engineering disciplines
Written to be accessible to non-experts in the subject, this work communicates the importance of this technology and how it can support and challenge all interrelated actors as well as all involved assets across many domains.
Author(s): Joanna F. DeFranco, Mohamad Kassab
Edition: 1
Publisher: CRC Press
Year: 2021
Language: English
Pages: 200
Tags: IoT; Internet of Things; CPS; Cyber-Physical Systems; blockchain;
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Authors
Acknowledgments
Chapter 1 Internet of Things Defined
1.1 Introduction
1.2 IoT Defined
1.3 IoT Ecosystems
1.4 IoT Applications
1.5 IoT Challenges
1.6 IoT Development Approach
Further Reading
Chapter 2 Networks of ‘Things’
2.1 Introduction
2.2 Networks of ‘Things’
2.3 The Primitives
2.3.1 Primitive #1: Sensor
2.3.2 Primitive #2: Aggregator
2.3.2.1 Actor #1: Cluster (or “Sensor Cluster”)
2.3.2.2 Actor #2: Weight
2.3.3 Primitive #3: Communication Channel
2.3.4 Primitive #4: eUtility (External Utility)
2.3.5 Primitive #5: Decision Trigger
2.3.6 Additional Notes on the Primitives
2.4 The Elements
2.5 Additional Considerations
2.5.1 Open, Closed
2.5.2 Patterns
2.5.3 Composition and Trust
2.5.4 NoT Testability
2.5.5 Environment
2.6 Reliability and Security Primitive Scenarios
2.7 Summary
2.8 Additional Takeaway Messages
2.9 Acronym Glossary
Further Reading
Chapter 3 Smart Cities
3.1 Introduction
3.2 Motivational Example
3.3 Background
3.4 The Anatomy of a Smart City under IoT Perspective
3.5 Challenges for Using IoT as the Backbone of Smart Cities
3.6 Conclusion
Further Reading
Chapter 4 Smart Cities – Energy
4.1 Introduction
4.2 IoT for Smart Energy
4.3 Examples of overcoming Smart Energy Challenges
4.3.1 Gorona del Viento Wind-Hydro at El Hierro Canary Island in Spain
4.3.2 Virtual Powerplant and Microgrid at Aruba Caribbean Island
4.4 Conclusion
Further Reading
Chapter 5 Smart Cities – Security
5.1 Introduction
5.2 Smart City Architecture
5.3 Attack Point Examples in a Smart City
5.3.1 Device/Sensor Level
5.3.2 Application Level
5.3.3 Network Level
5.3.4 Edge/Cloud Level
5.4 Threat Scenarios
5.4.1 Traffic Chaos
5.4.2 Medical Ransomware
5.4.3 Energy System Hacking
5.4.4 Building Attack
5.4.5 Privacy Breach
5.5 Securing Smart Cities
5.5.1 Cybersecurity Risk Management
5.5.2 Cyber Patrol Bot
5.5.3 Security and Privacy Label
5.5.4 Nurturing Talented Cybersecurity Personnel
5.6 Conclusion
Further Reading
Chapter 6 Smart Homes
6.1 Introduction
6.2 Security Design and Management
6.2.1 Smart Home Security Overview
6.2.2 Smart Home Design and Management
6.2.3 Physical Security
6.3 Smart Home Products/Tools/Application
6.3.1 Smart Home Products Examples
6.3.2 Smart Home Products Design Considerations
6.3.2.1 User Acceptance/User Experience
6.3.2.2 Data Transfer
6.3.2.3 System Integration
6.3.2.4 Artificial Intelligence
6.4 Activity/Behavior Patterns
6.5 Power Efficiency
6.5.1 Managing activity and daily consumption
6.6 Systems Design
6.6.1 Architecture
6.6.2 Requirements
6.6.3 Simulations/Modeling
6.7 Constructing an IoT Home Device
6.7.1 Smart Garden
6.7.2 Smart Trashcan
6.7.2.1 Concept
6.8 Conclusion
Further Reading
Chapter 7 IoT in Education
7.1 Introduction
7.2 What Are the Benefits of the Adopted Scenarios of IoT in Education?
7.2.1 Applying IoT in different Education Levels and Subjects
7.2.2 Perception
7.2.3 Learning Principles
7.2.4 Delivery Mode
7.3 What Are the Challenges of Incorporating IoT in Education?
7.3.1 Security
7.3.2 Scalability
7.3.3 Humanization
7.4 Monitoring Emotional State of Online Learner: A Tool
7.5 Discussion
7.5.1 What Are the Right Devices and Processing Components for IoT Pedagogy?
7.5.2 How Are Instructors, Staff, and Students Going to Connect and Use the IoT Network for Teaching and Learning?
7.5.3 What Can Educational Institutes Do to Mitigate These Complexities?
7.6 Conclusion
Further Reading
Chapter 8 IoT Education
8.1 Introduction
8.2 Internet of Things
8.3 The ACM and IEEE Computer Science Knowledge Areas
8.4 Mapping Study and Programs Review
8.4.1 Overview of Courses from the Mapping Study
8.4.2 Overview of Courses from the Programs Review
8.5 CPS/IoT Courses and the IoT Primitives
8.6 CPS /IoT Courses and Knowledge Areas of Computer Science
8.7 Recommendations
References
Chapter 9 IoT in Healthcare
9.1 Introduction
9.2 General Classification for Use Cases for IoT in Healthcare
9.3 IoT for Tracking Humans
9.3.1 Alcoholism Use Case
9.3.2 Digital Surveillance to Combat COVID-19
9.3.2.1 Digital Tracking with Nonmobile Technologies
9.3.2.2 Digital Tracking with Mobile Technologies
9.4 Consideration for Quality Requirements for IoT in Healthcare Applications
9.4.1 Privacy Requirements
9.4.1.1 Privacy Concerns with Contact-Tracing Applications
9.4.2 Safety Concerns
9.4.3 Technology and Social Constraints
9.4.4 Emerging Quality Requirements for IoT in Healthcare
9.5 Smart Medical Devices
References
Chapter 10 IoT Trust Concerns
10.1 Introduction
10.2 Executive Summary of NISTIR 8222 (DRAFT)
10.2.1 Scalability
10.2.3 Heterogeneity
10.2.4 Ownership and Control
10.2.5 Composability, Interoperability, Integration, and Compatibility
10.2.6 “Ilities”
10.2.7 Synchronization
10.2.8 Measurement
10.2.9 Predictability
10.2.10 Testing and Assurance
10.2.11 Certification
10.2.12 Security
10.2.13 Reliability
10.2.14 Data Integrity
10.2.15 Excessive Data
10.2.16 Performance
10.2.17 Usability
10.2.18 Visibility and Discovery
10.3 Introduction of NISTIR 8222 (DRAFT)
10.4 Overwhelming Scalability
10.5 Heterogeneity
10.6 Loss of Ownership and Control
10.7 Composability, Interoperability, Integration, and Compatibility
10.8 Abundance of “Ilities”
10.9 Synchronization
10.10 Lack of Measurement
10.11 Predictability
10.12 Few IoT-Specific Testing and Assurance Approaches
10.13 Lack of IoT Certification Criteria
10.14 Security
10.14.1 Security of ‘Things’
10.14.2 Passwords
10.14.3 Secure Upgrade Process
10.14.4 Summary
10.15 Reliability
10.16 Data Integrity
10.17 Excessive Data
10.18 Speed and Performance
10.19 Usability
10.20 Visibility and Discoverability
10.21 Summary
10.22 Additional Supporting Information
10.22.1 Insurability and Risk Measurement
10.22.2 Regulatory Oversight and Governance
10.22.3 Six Trustworthiness Elements in NIST SP 800-183
Acronym Glossary
References
Chapter 11 Blockchain Technologies and IoT
11.1 Introduction
11.2 The Idea of Cryptocurrencies
11.3 Bitcoin
11.3.1 The Bitcoin Address
11.3.2 The Bitcoin Blockchain
11.3.3 The Bitcoin Transaction
11.4 Smart Contracts
11.5 IoT and Smart Contracts: A Food Traceability System
11.5.1 A Practical Example: Cheese Production Supply-Chain
11.6 Conclusion
Further Reading
Chapter 12 IoT Requirements and Architecture: A Case Study
12.1 Introduction
12.2 Case Study Description: Home Automation Management System (HAMS)
12.3 Requirements for the Home Automation Management System (HAMS)
12.4 Architectural Options for HAMS
12.5 Conclusion
Further Reading
Index