What Every Engineer Should Know About the Internet of Things
Internet of Things (IoT) products and cyber-physical systems (CPS) are being utilized in almost every discipline. In addition, a significant increase in spending on design, development, and deployment of IoT applications and analytics within every domain, from our homes, schools, healthcare, governm...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Milton
CRC Press
2022
Taylor & Francis Group |
| Edition: | 1 |
| Series: | What Every Engineer Should Know |
| Subjects: | |
| ISBN: | 0367462729, 9780367462727, 9780367858780, 0367858789 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- 7.5.3 What Can Educational Institutes Do to Mitigate These Complexities? -- 7.6 Conclusion -- Further Reading -- Chapter 8 IoT Education -- 8.1 Introduction -- 8.2 Internet of Things -- 8.3 The ACM and IEEE Computer Science Knowledge Areas -- 8.4 Mapping Study and Programs Review -- 8.4.1 Overview of Courses from the Mapping Study -- 8.4.2 Overview of Courses from the Programs Review -- 8.5 CPS/IoT Courses and the IoT Primitives -- 8.6 CPS /IoT Courses and Knowledge Areas of Computer Science -- 8.7 Recommendations -- References -- Chapter 9 IoT in Healthcare -- 9.1 Introduction -- 9.2 General Classification for Use Cases for IoT in Healthcare -- 9.3 IoT for Tracking Humans -- 9.3.1 Alcoholism Use Case -- 9.3.2 Digital Surveillance to Combat COVID-19 -- 9.3.2.1 Digital Tracking with Nonmobile Technologies -- 9.3.2.2 Digital Tracking with Mobile Technologies -- 9.4 Consideration for Quality Requirements for IoT in Healthcare Applications -- 9.4.1 Privacy Requirements -- 9.4.1.1 Privacy Concerns with Contact-Tracing Applications -- 9.4.2 Safety Concerns -- 9.4.3 Technology and Social Constraints -- 9.4.4 Emerging Quality Requirements for IoT in Healthcare -- 9.5 Smart Medical Devices -- References -- Chapter 10 IoT Trust Concerns -- 10.1 Introduction -- 10.2 Executive Summary of NISTIR 8222 (DRAFT) -- 10.2.1 Scalability -- 10.2.3 Heterogeneity -- 10.2.4 Ownership and Control -- 10.2.5 Composability, Interoperability, Integration, and Compatibility -- 10.2.6 "Ilities" -- 10.2.7 Synchronization -- 10.2.8 Measurement -- 10.2.9 Predictability -- 10.2.10 Testing and Assurance -- 10.2.11 Certification -- 10.2.12 Security -- 10.2.13 Reliability -- 10.2.14 Data Integrity -- 10.2.15 Excessive Data -- 10.2.16 Performance -- 10.2.17 Usability -- 10.2.18 Visibility and Discovery -- 10.3 Introduction of NISTIR 8222 (DRAFT) -- 10.4 Overwhelming Scalability
- 5.4 Threat Scenarios -- 5.4.1 Traffic Chaos -- 5.4.2 Medical Ransomware -- 5.4.3 Energy System Hacking -- 5.4.4 Building Attack -- 5.4.5 Privacy Breach -- 5.5 Securing Smart Cities -- 5.5.1 Cybersecurity Risk Management -- 5.5.2 Cyber Patrol Bot -- 5.5.3 Security and Privacy Label -- 5.5.4 Nurturing Talented Cybersecurity Personnel -- 5.6 Conclusion -- Further Reading -- Chapter 6 Smart Homes -- 6.1 Introduction -- 6.2 Security Design and Management -- 6.2.1 Smart Home Security Overview -- 6.2.2 Smart Home Design and Management -- 6.2.3 Physical Security -- 6.3 Smart Home Products/Tools/Application -- 6.3.1 Smart Home Products Examples -- 6.3.2 Smart Home Products Design Considerations -- 6.3.2.1 User Acceptance/User Experience -- 6.3.2.2 Data Transfer -- 6.3.2.3 System Integration -- 6.3.2.4 Artificial Intelligence -- 6.4 Activity/Behavior Patterns -- 6.5 Power Efficiency -- 6.5.1 Managing activity and daily consumption -- 6.6 Systems Design -- 6.6.1 Architecture -- 6.6.2 Requirements -- 6.6.3 Simulations/Modeling -- 6.7 Constructing an IoT Home Device -- 6.7.1 Smart Garden -- 6.7.2 Smart Trashcan -- 6.7.2.1 Concept -- 6.8 Conclusion -- Further Reading -- Chapter 7 IoT in Education -- 7.1 Introduction -- 7.2 What Are the Benefits of the Adopted Scenarios of IoT in Education? -- 7.2.1 Applying IoT in different Education Levels and Subjects -- 7.2.2 Perception -- 7.2.3 Learning Principles -- 7.2.4 Delivery Mode -- 7.3 What Are the Challenges of Incorporating IoT in Education? -- 7.3.1 Security -- 7.3.2 Scalability -- 7.3.3 Humanization -- 7.4 Monitoring Emotional State of Online Learner: A Tool -- 7.5 Discussion -- 7.5.1 What Are the Right Devices and Processing Components for IoT Pedagogy? -- 7.5.2 How Are Instructors, Staff, and Students Going to Connect and Use the IoT Network for Teaching and Learning?
- Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Authors -- Acknowledgments -- Chapter 1 Internet of Things Defined -- 1.1 Introduction -- 1.2 IoT Defined -- 1.3 IoT Ecosystems -- 1.4 IoT Applications -- 1.5 IoT Challenges -- 1.6 IoT Development Approach -- Further Reading -- Chapter 2 Networks of 'Things' -- 2.1 Introduction -- 2.2 Networks of 'Things' -- 2.3 The Primitives -- 2.3.1 Primitive #1: Sensor -- 2.3.2 Primitive #2: Aggregator -- 2.3.2.1 Actor #1: Cluster (or "Sensor Cluster") -- 2.3.2.2 Actor #2: Weight -- 2.3.3 Primitive #3: Communication Channel -- 2.3.4 Primitive #4: eUtility (External Utility) -- 2.3.5 Primitive #5: Decision Trigger -- 2.3.6 Additional Notes on the Primitives -- 2.4 The Elements -- 2.5 Additional Considerations -- 2.5.1 Open, Closed -- 2.5.2 Patterns -- 2.5.3 Composition and Trust -- 2.5.4 NoT Testability -- 2.5.5 Environment -- 2.6 Reliability and Security Primitive Scenarios -- 2.7 Summary -- 2.8 Additional Takeaway Messages -- 2.9 Acronym Glossary -- Further Reading -- Chapter 3 Smart Cities -- 3.1 Introduction -- 3.2 Motivational Example -- 3.3 Background -- 3.4 The Anatomy of a Smart City under IoT Perspective -- 3.5 Challenges for Using IoT as the Backbone of Smart Cities -- 3.6 Conclusion -- Further Reading -- Chapter 4 Smart Cities - Energy -- 4.1 Introduction -- 4.2 IoT for Smart Energy -- 4.3 Examples of overcoming Smart Energy Challenges -- 4.3.1 Gorona del Viento Wind-Hydro at El Hierro Canary Island in Spain -- 4.3.2 Virtual Powerplant and Microgrid at Aruba Caribbean Island -- 4.4 Conclusion -- Further Reading -- Chapter 5 Smart Cities - Security -- 5.1 Introduction -- 5.2 Smart City Architecture -- 5.3 Attack Point Examples in a Smart City -- 5.3.1 Device/Sensor Level -- 5.3.2 Application Level -- 5.3.3 Network Level -- 5.3.4 Edge/Cloud Level
- 10.5 Heterogeneity -- 10.6 Loss of Ownership and Control -- 10.7 Composability, Interoperability, Integration, and Compatibility -- 10.8 Abundance of "Ilities" -- 10.9 Synchronization -- 10.10 Lack of Measurement -- 10.11 Predictability -- 10.12 Few IoT-Specific Testing and Assurance Approaches -- 10.13 Lack of IoT Certification Criteria -- 10.14 Security -- 10.14.1 Security of 'Things' -- 10.14.2 Passwords -- 10.14.3 Secure Upgrade Process -- 10.14.4 Summary -- 10.15 Reliability -- 10.16 Data Integrity -- 10.17 Excessive Data -- 10.18 Speed and Performance -- 10.19 Usability -- 10.20 Visibility and Discoverability -- 10.21 Summary -- 10.22 Additional Supporting Information -- 10.22.1 Insurability and Risk Measurement -- 10.22.2 Regulatory Oversight and Governance -- 10.22.3 Six Trustworthiness Elements in NIST SP 800-183 -- Acronym Glossary -- References -- Chapter 11 Blockchain Technologies and IoT -- 11.1 Introduction -- 11.2 The Idea of Cryptocurrencies -- 11.3 Bitcoin -- 11.3.1 The Bitcoin Address -- 11.3.2 The Bitcoin Blockchain -- 11.3.3 The Bitcoin Transaction -- 11.4 Smart Contracts -- 11.5 IoT and Smart Contracts: A Food Traceability System -- 11.5.1 A Practical Example: Cheese Production Supply-Chain -- 11.6 Conclusion -- Further Reading -- Chapter 12 IoT Requirements and Architecture: A Case Study -- 12.1 Introduction -- 12.2 Case Study Description: Home Automation Management System (HAMS) -- 12.3 Requirements for the Home Automation Management System (HAMS) -- 12.4 Architectural Options for HAMS -- 12.5 Conclusion -- Further Reading -- Index

