HOME > 상세정보

상세정보

Internet of things : architectures, protocols and standards

Internet of things : architectures, protocols and standards

자료유형
단행본
개인저자
Cirani, Simone, 1982-.
서명 / 저자사항
Internet of things : architectures, protocols and standards / Simone Cirani ... [et al.].
발행사항
Hoboken, NJ :   Wiley,   c2019.  
형태사항
xvii, 383 p. : ill. ; 23 cm.
ISBN
9781119359678 (hardcover)
서지주기
Includes bibliographical references and index.
일반주제명
Internet of things.
000 00000cam u2200205 a 4500
001 000045999017
005 20190919144254
008 190919s2019 njua b 001 0 eng d
010 ▼a 2018021870
020 ▼a 9781119359678 (hardcover)
035 ▼a (KERIS)REF000018712594
040 ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d 211009
050 0 0 ▼a TK5105.8857 ▼b .C55 2019
082 0 0 ▼a 004.67/8 ▼2 23
084 ▼a 004.678 ▼2 DDCK
090 ▼a 004.678 ▼b I613
245 0 0 ▼a Internet of things : ▼b architectures, protocols and standards / ▼c Simone Cirani ... [et al.].
260 ▼a Hoboken, NJ : ▼b Wiley, ▼c c2019.
300 ▼a xvii, 383 p. : ▼b ill. ; ▼c 23 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Internet of things.
700 1 ▼a Cirani, Simone, ▼d 1982-.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 004.678 I613 등록번호 121250353 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

저자소개

Gianluigi Ferrari(지은이)

Marco Picone(지은이)

Simone Cirani(지은이)

Luca Veltri(지은이)

정보제공 : Aladin

목차

1 Preliminaries, Motivation, and Related Work 1

1.1 What is the Internet of Things? 1

1.2 Wireless Ad-hoc and Sensor Networks: the Ancestors without IP 1

1.3 IoT-enabled applications 2

1.3.1 Home and Building Automation 3

1.3.2 Smart Cities 3

1.3.3 Smart Grid 3

1.3.4 Industrial IoT 4

1.3.5 Smart Farming 5

2 Standards 7

2.1 “Traditional” Internet review 7

2.1.1 Physical/Link Layer 8

2.1.2 Network Layer 11

2.1.3 Transport Layer 13

2.1.4 Application Layer 16

2.2 Internet of Things 19

2.2.1 Architecting an IP-based Internet of Things 20

2.2.2 Physical/Link Layer 21

2.2.3 Network Layer 25

2.2.4 Transport Layer 26

2.2.5 Application Layer 26

2.3 Industrial Internet of Things 59

3 Interoperability 61

3.1 Applications in the Internet of Things 61

3.2 The verticals: Cloud-based solutions 61

3.3 REST architectures: the Web of Things 63

3.3.1 REST: the Web as a platform 64

3.3.2 Richardson maturity model 68

3.4 The Web of Things 76

3.5 Messaging Queues and Publish/Subscribe Communications 77

3.5.1 Advantages of Pub/Sub 77

3.5.2 Disadvantages of Pub/Sub 78

3.5.3 MQTT 78

3.6 Session Initiation for the Internet of Things 80

3.6.1 Motivations 80

3.6.2 Lightweight Sessions in IoT 81

3.7 Performance Evaluation 86

3.7.1 Implementation 86

3.7.2 Experimental results 87

3.7.3 Conclusions 90

3.8 Optimized communications: a Data-driven IoT-oriented Dual-network Management Protocol 90

3.8.1 DNMP Motivations 91

3.8.2 Related Work 92

3.8.3 The DNMP Protocol 93

3.8.4 Implementation with IEEE 802.15.4 and IEEE 802.11s 97

3.8.5 Performance evaluation 99

3.8.6 IEEE 802.15.4-controlled Selective Activation of the IEEE 802.11s Network 103

3.8.7 Conclusions 104

3.9 Discoverability in Constrained Environments 105

3.9.1 CoRE Link Format 105

3.9.2 CoRE interfaces 108

3.10 Data formats - Media Types for Sensor Markup Language (SenML) 110

4 Discoverability 115

4.1 Service and Resource Discovery 115

4.2 Local and Large-scale Service Discovery 116

4.2.1 ZeroConf 119

4.2.2 UPnP 120

4.2.3 URI Beacons and the Physical Web 120

4.3 A scalable and self-configuring architecture for service discovery in the Internet of Things 122

4.3.1 IoT Gateway 123

4.3.2 A P2P-based Large Scale Service Discovery Architecture 126

4.3.3 Zeroconf-based Local Service Discovery for Constrained Environments 132

4.3.4 Implementation results 135

4.4 Lightweight Service Discovery in Low-power IoT Networks 142

4.4.1 Efficient Forwarding Protocol for Service Discovery 144

4.4.2 Efficient Multiple Unicast Forwarding 146

4.5 Implementation Results 148

5 Security and Privacy in the IoT 153

5.1 Security issues in the IoT 153

5.2 Security mechanisms overview 156

5.2.1 Traditional vs. Lightweight security 157

5.2.2 Lightweight cryptography 162

5.2.3 Key Agreement, Distribution, and Security Bootstrapping 173

5.2.4 Processing Data in the Encrypted Domain: Secure Data Aggregation 174

5.2.5 Authorization Mechanisms for Secure IoT Services 176

5.3 Privacy issues in the IoT (confidentiality, aggregation, pseudonymity and anonymity) 179

5.4 The role of authorization 179

5.4.1 IoT-OAS: A delegation-based authorization framework for the Internet of Things 182

5.4.2 Application Scenarios 187

6 Cloud and Fog Computing for the Internet of Things 191

6.1 Cloud Computing 191

6.2 Big Data Processing Pattern 192

6.3 Big Stream 193

6.3.1 Big Stream-Oriented Architecture 195

6.3.2 Graph-based Processing 198

6.3.3 Implementation 200

6.3.4 Performance Evaluation 207

6.3.5 Solutions and Security Considerations 209

6.4 Big Stream and Security 212

6.4.1 Graph-based Cloud System Security 213

6.4.2 Normalization after a Secure Stream Acquisition with OFS Module 215

6.4.3 Enhancing Application Register with IGS Module 216

6.4.4 Securing Stream inside Graph Nodes 218

6.4.5 Evaluation of a Secured Big Stream Architecture 221

6.5 Fog Computing and IoT 225

6.6 The Role of the IoT Hub 227

6.6.1 Virtualization and Replication 228

7 IoT in Practice 243

7.1 Hardware for the IoT 243

7.1.1 Classes of Constrained Devices 245

7.1.2 Hardware Platforms 246

7.2 Software for the IoT 256

7.2.1 Contiki OS 259

7.3 Vision and Architecture of a Testbed for the Web of Things 261

7.3.1 An All IP-based Infrastructure for Smart Objects 264

7.3.2 Enabling interactions with Smart Objects through the IoT Hub 265

7.3.3 Testbed Access and Security 267

7.3.4 Exploiting the Testbed: Building WoT Applications for Mobile and Wearable Devices 268

7.3.5 Open Challenges and Future Vision 270

7.4 Wearable Computing for the Internet of Things: Interaction Patterns with Smart Objects in RESTful Environments 271

7.4.1 Shaping the Internet of Things in a Mobile-Centric World 271

7.4.2 Interaction Patterns with Smart Objects through Wearable Devices 272

7.4.3 Implementation in a real-world IoT testbed 275

7.5 Effective Authorization for the Web of Things 278

7.5.1 Authorization Framework Architecture 281

7.5.2 Implementation and Validation 283


정보제공 : Aladin

관련분야 신착자료

김자미 (2021)