Design of Secure IoT Systems: A Practical Approach Across Industries

by ; ;
Edition: 1st
Format: Hardcover
Pub. Date: 2021-07-15
Publisher(s): McGraw Hill
  • Free Shipping Icon

    Free Shipping on All Orders!

    *excludes Marketplace items.

List Price: $99.00

Buy New

Special Order. We will make every effort to obtain this item but cannot guarantee stock or timing.
$92.97

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$123.75
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$123.75*

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Table of Contents

Preface
1 Evolution of IoT
   1.1 Introduction to Digital Transformation
   1.2 Connected Value Chain
   1.3 What Is Digital Transformation?
   1.4 Introduction to IoT
   1.5 Building Blocks of IoT System
   1.6 Evolution of IoT
   1.7 Connected Vehicle Use Case
   1.8 Chapters Overview
2 IoT Architecture and Technology Essentials
   2.1 Introduction
   2.2 IoT System Architecture
   2.3 IoT Technology and Protocols
   2.4 Applying Learnings to Connected Vehicle Use Case
   2.5 Conclusion
3 Connected Machines
   3.1 Introduction
   3.2 Machine-to-Machine (M2M) Segments
   3.3 M2M Communication
   3.4 Applications of M2M
   3.5 Key Features of M2M
   3.6 Architecture and Components of M2M
   3.7 M2M Application Communication Principles
   3.8 Issues/Concerns in M2M
   3.9 Standardization Efforts for M2M
   3.10 Conclusion
4 Network Architecture for IoT
   4.1 Introduction
   4.2 Network Terminology
   4.3 ISO-OSI Reference Model
   4.4 Network Protocols
   4.5 WAN Architecture
   4.6 MAC Source Address
   4.7 Data Reception
   4.8 Multiprotocol Label Switching
   4.9 Data Center
   4.10 Data Center Networking
   4.11 IoT Gateways
   4.12 Conclusion
5 IoT Hardware Design Fundamentals
   5.1 Introduction
   5.2 Hardware System Requirements
   5.3 Hardware Functional Specifications
   5.4 Software Functional Specifications
   5.5 Hardware Component Selection
   5.6 Design for Manufacturability
   5.7 Design for Testability
   5.8 Schematics, Layout, and Gerbers
   5.9 PCB Fabrication and Assembly
   5.10 Summarizing HW Design Flow
   5.11 Applying Learnings to Connected Vehicle Use Case
   5.12 Examples of Commercially Available IoT Devices
   5.13 Standards Used in HW Component Configurations
   5.14 Selection of Network Hardware for IoT Applications
   5.15 IoT Hardware Security
   5.16 Conclusion
6 IoT Data Systems Design
   6.1 Introduction
   6.2 IoT Data System
   6.3 Value Chain Activity Generates Data
   6.4 Operational Data: Sensors and Devices
   6.5 Business and Customer/User Data
   6.6 Intersection of Operational Data and Business Data
   6.7 Structured and Unstructured Data
   6.8 Data Systems Design
   6.9 Data Transport
   6.10 Data Collection
   6.11 Data Storage
   6.12 Data Preparation
   6.13 Organizing Data for Analytics
   6.14 Data Lake, Data Warehouses, and Efficient Access to Data
   6.15 Analytics and Business Intelligence
   6.16 Data Science and IoT
   6.17 Machine Learning
   6.18 Putting It Together to Build an IoT Data System
   6.19 Applying Learnings to Connected Vehicle Use Case
   6.20 Conclusion
7 IoT: Designing with Trust and Security
   7.1 Introduction
   7.2 Need for a Secure IoT System
   7.3 Requirements for Secure IoT System
   7.4 IoT Device Security
   7.5 Trusted IoT Device
   7.6 Trusted Device Identity
   7.7 IoT Device Secure Storage
   7.8 Secure Boot and Trusted Execution Environment
   7.9 Secure Root of Trust
   7.10 Trustworthy Firmware and Software
   7.11 Public Key Infrastructure
   7.12 Trusted Supply Chain
   7.13 Secure Random Number Generator
   7.14 IoT D2X (Device to X) Communication Security
   7.15 Mutually Authenticated Endpoints
   7.16 Secure Communication Channel and End-to-End Message Integrity
   7.17 Secure Monitoring Systems
   7.18 IoT Device to Cloud Security
   7.19 IoT Data Security Policies and Regulations
   7.20 IoT Trusted Platform
   7.21 Secure Authentication
   7.22 End-to-End Security (Including Third Parties)
   7.23 Applying Learnings to Connected Vehicle Use Case
   7.24 Conclusion
   Appendix: IoT Cybersecurity Threats and Risks Review Sample
8 Automation
   8.1 Introduction
   8.2 IoT Device Life Cycle Management
   8.3 Zero Touch IoT Devices
   8.4 Plug and Play IoT Devices
   8.5 IoT SIM Cards and Management
   8.6 Commercially Available IoT Control Software
   8.7 Secure Automation of IoT Network Infrastructure
   8.8 IoT Application Software Design Principles
   8.9 Cloud Native Software
   8.10 Automation of Value Chain Workflows
   8.11 Edge Computing and Cloud Computing
   8.12 Applying Learnings to Connected Vehicle Use Case
   8.13 Conclusion
9 IoT Use Cases Across Industries
   9.1 Introduction
   9.2 Manufacturing Sector
   9.3 Connected Vehicles
   9.4 Seaport Automation
   9.5 Airport Automation
   9.6 Drones for Medical/Healthcare Systems
   9.7 IoT Application in Oil and Natural Gas Industry
   9.8 Conclusion
10 IoT Use Case Exercises
   10.1 Banking Sector/Bank of Things
   10.2 Agriculture—Agri of Things
   10.3 Enhanced Smart Home (Home Automation)
   10.4 Smart Manufacturing
   10.5 Internet of Medical Things (IoMT)
   10.6 Smart City with Smart Vehicles and Smart Home
   10.7 Smart Grid
References
Index

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.