The technical foundation of iot

489 11 0
  • Loading ...
1/489 trang
Tải xuống

Thông tin tài liệu

Ngày đăng: 22/05/2020, 23:04

Contents Foreword by Andy Stanford-Clark xv Foreword by Alexandra Deschamps-Sonsino xvii Introduction by Stefan Grasmann xix Preface by Boris Adryan xxiii Reasons for This Book xxiii How to Navigate This Book xxv Acknowledgments xxxi I Physical Principles and Information Chapter Chapter Electricity and Electromagnetism 1.1 Matter, Elements and Atoms 1.1.1 Electron Configuration and Atomic Orbitals 1.1.2 Conductors and Semiconductors 1.1.3 Electric Charge, Current and Voltage 1.2 Electric and Magnetic Fields 1.2.1 Magnets and Magnetism 1.2.2 Interactions of Electric and Magnetic Fields 1.2.3 Electromagnetic Spectrum 10 19 19 20 23 Electronics 45 2.1 Components 45 2.1.1 Passive Components 46 v vi CONTENTS 2.2 2.3 Chapter 2.1.2 Active Components Analogue and Digital Circuits 2.2.1 Logic gates 2.2.2 Memory 2.2.3 Binary Calculations 2.2.4 Logic Chips Programmable Computers 2.3.1 Field-Programmable Gate Arrays 2.3.2 Microcontrollers 2.3.3 Multipurpose Computers Information Theory and Computing 3.1 Information Content 3.2 A/D and D/A Conversion 3.3 Digital Signal Processing 3.4 Computability 53 63 63 63 66 69 69 71 73 74 75 75 76 80 81 II Historical Perspective of the Internet of Things 85 Chapter 87 87 90 91 92 92 92 93 50 Years of Networking 4.1 The Early Internet 4.2 World Wide Web and Web 2.0 4.2.1 World Wide Web 4.2.2 Web 2.0 4.3 Connecting Things 4.3.1 Industrial Control Systems 4.3.2 The Internet of Things III Applications of M2M and IoT 95 Chapter The Difference Between M2M and IoT 97 Chapter Common Themes Around IoT Ecosystems 6.1 Industry 6.1.1 Smart Energy 6.1.2 Smart Manufacturing 6.1.3 Smart Retail 101 104 105 107 110 CONTENTS 6.2 6.3 Chapter vii 6.1.4 Agriculture Cities and Municipalities 6.2.1 Energy, Gas and Water 6.2.2 Environment 6.2.3 Traffic 6.2.4 Security and Safety 6.2.5 Summary Connected Vehicle 6.3.1 Smart Buildings and Assisted Living 6.3.2 Smart Buildings 6.3.3 Assisted Living 110 112 112 113 114 115 116 116 118 118 120 Drivers and Limitations 123 7.1 Drivers for Adoption 123 7.2 Limitations 124 IV Architectures of M2M and IoT Solutions 127 Chapter 129 129 130 132 134 Chapter Components of M2M and IoT Solutions 8.1 Overview 8.2 Sensors and Actuators 8.3 Gateways and Hub Devices 8.4 Cloud and Data Platforms Architectural Considerations 137 9.1 Network Topologies 137 9.2 Spatial Dimensions of Networking 139 Chapter 10 Common IoT Architectures 141 10.1 Mesh Networks 141 10.2 Local Gateway 143 10.3 Direct Connection 145 Chapter 11 Human Interfaces 147 11.1 User Experience and Interfaces 147 11.2 Mobile Phones and End Devices 149 viii CONTENTS V Hardware 153 Chapter 12 Hardware Development 155 Chapter 13 Power 13.1 Constraints of Field-Deployed Devices 13.2 Power Adapters 13.2.1 Conventional AC/DC Adapters 13.2.2 USB 13.2.3 PoE 13.3 Batteries 13.3.1 Battery Chemistry 13.3.2 Rechargeable Batteries 13.3.3 Battery Types and Real-Life Properties 13.4 Renewable Energy Sources 13.4.1 Solar Panels 13.4.2 Energy Harvesting 159 160 160 160 162 162 163 164 167 170 173 174 176 177 177 178 180 180 180 183 185 187 188 188 189 190 191 191 193 195 197 200 201 Chapter 14 Actuators 14.1 From Buzzers to Speakers (Sound) 14.2 From Indicator Lights to Displays (Light) 14.3 From Vibration to Rotation to Switching (Motion) 14.3.1 Vibration and Piezoelectric Motors 14.3.2 Solenoids and Electromagnetic Motors 14.3.3 Relays 14.4 Other Forms of Energy Chapter 15 Sensors 15.1 Time 15.2 Location 15.2.1 Global Localization 15.2.2 Indoor Localization 15.3 Physical Triggers 15.3.1 Position, Motion and Acceleration 15.3.2 Force and Pressure 15.3.3 Light and Sound 15.3.4 Temperature 15.3.5 Current 15.4 Chemical Triggers CONTENTS 15.4.1 15.4.2 15.4.3 15.4.4 ix Solid Particles Humidity pH and Other Ion-Specific Indicators Alkanes, Alcohols and Amines Chapter 16 Embedded Systems 16.1 Microcontrollers 16.1.1 Architectures 16.1.2 Power Consumption 16.1.3 Input-Output Capability 16.1.4 Operating Systems and Programming 201 203 205 206 207 208 210 211 211 212 VI Device Communication 213 Chapter 17 Communication Models 17.1 Open Systems Interconnection Reference Model 17.1.1 Layer 1: Physical 17.1.2 Layer 2: Data Link 17.1.3 Layer 3: Network 17.1.4 Layer 4: Transport 17.1.5 Layers – 7: Session, Presentation, Application 17.2 Transmission Control Protocol/Internet Protocol Model 215 216 216 216 218 218 218 219 Chapter 18 Information Encoding and Standard Quantities 221 18.1 Coding Schemes 221 18.2 Information Quantities 222 18.3 Information Encoding 223 Chapter 19 Industry Standards 19.1 Hardware Interfaces 19.1.1 Communication Principles 19.1.2 Serial/UART 19.1.3 Serial Buses 19.1.4 Joint Test Action Group 19.1.5 Universal Serial Bus 19.2 Longer-Range Wired Communications 19.2.1 Fieldbus Systems 19.2.2 Ethernet 225 226 226 228 229 233 233 235 238 248 x CONTENTS 19.3 VII 19.2.3 Powerline Wireless Standards 19.3.1 Passive and Near-Field Radio 19.3.2 Data Radio 19.3.3 Cellular Data Services 19.3.4 Satellite Communication Software 254 255 261 265 279 285 289 Chapter 20 Introduction 20.1 Common Issues of Distributed Systems 20.1.1 The Fallacies of Distributed Computing 20.1.2 Identity and Openness of IoT Systems 291 292 294 294 Chapter 21 Embedded Software Development 297 21.1 Power Saving and Sleep Management 298 21.2 Real-Time Requirements and Interrupts 299 Chapter 22 Network Protocols: Internet and IoT 22.1 Network Protocols 22.2 Network Protocols in the Context of the OSI Model 22.2.1 Advantages of a Layered Communication Protocol Model 22.2.2 Vertical and Horizontal Communication within the OSI Model 22.2.3 Data Encapsulation 22.2.4 Indirect Connection and Message Routing 22.2.5 OSI Layers Revisited 22.3 Internet Protocol Suite 22.3.1 TCP/IP and the OSI Model 22.3.2 Layers of TCP/IP Messaging 22.3.3 Internet Protocol 22.3.4 TCP 22.3.5 UDP 22.3.6 Ports 22.4 HTTP and HTTP/2 22.4.1 HTTP Methods 22.4.2 HTTP/2.0 301 302 302 303 304 304 305 306 309 309 310 311 315 317 318 319 320 320 CONTENTS xi 22.4.3 HTTP Authentication 22.4.4 RESTful APIs 22.4.5 HTTP for IoT Communication 22.5 CoAP 22.5.1 UDP as Transport Protocol 22.5.2 Protocol Features 22.5.3 Use Cases 22.5.4 CoAP Discovery 22.5.5 Comparison to HTTP 22.6 XMPP 22.6.1 Protocol Features 22.6.2 XMPP as an IoT Protocol 22.6.3 Use Cases 22.7 AMQP 22.7.1 Characteristics of AMQP 22.7.2 Basic Concepts 22.7.3 Protocol Features 22.7.4 AMQP for the Internet of Things 22.7.5 AMQP 0.9.1 vs 1.0 22.7.6 Use Cases 22.8 MQTT 22.8.1 Publish/Subscribe 22.8.2 Protocol Characteristics 22.8.3 Features 22.8.4 Use Cases 22.9 Other Protocols 22.10 Choosing an IoT protocol Chapter 23 Backend Software 23.1 IoT Platform Services 23.2 Functions of an IoT Backend 23.2.1 Message Handling 23.2.2 Storage 323 324 324 325 326 326 327 328 328 329 329 331 331 332 332 333 334 335 336 336 337 337 339 340 341 341 342 345 345 347 347 349 Chapter 24 Data Analytics 353 24.1 Why, When and Where of IoT Analytics 354 24.2 Exemplary Methods for Data Analytics 355 24.2.1 Exemplary Methods for Edge Processing 357 xii CONTENTS 24.2.2 Exemplary Methods for Stream Processing 359 24.2.3 Exemplary Methods for Batch Processing 361 Chapter 25 Conceptual Interoperability 25.1 Device Catalogs and Information Models 25.2 Ontologies 25.2.1 Structure and Reasoning 25.2.2 Building and Annotation 371 373 374 376 376 VIII Security 379 Chapter 26 Security and the Internet of Things 26.1 Boundaries 26.2 Other Attacks 26.3 The Fundamentals of Security 26.3.1 Confidentiality 26.3.2 Integrity 26.3.3 Availability 26.3.4 CIA+ 26.3.5 Authentication 26.4 Access Control 26.5 Non-Repudiation 381 382 383 385 385 386 386 387 387 389 391 393 393 395 398 398 400 401 402 404 405 Chapter 27 A Beginner’s Guide to Encryption 27.1 Shared Key Encryption 27.2 Public Key Cryptography 27.2.1 Prime Numbers and Elliptic Curves 27.2.2 Man-in-the-Middle Attacks 27.2.3 Certificates and Certificate Authorities 27.2.4 Transport Layer Security 27.2.5 An Example TLS Handshake 27.2.6 Datagram Transport Layer Security 27.3 Cryptography on Small Devices Chapter 28 Threats, Challenges, and Concerns for IoT Security and Privacy 407 28.1 A1: Device Confidentiality 407 28.2 B1: Network Confidentiality 409 28.3 C1: Cloud/Server Confidentiality 411 CONTENTS 28.4 28.5 28.6 28.7 28.8 28.9 28.10 28.11 28.12 28.13 28.14 28.15 28.16 28.17 28.18 28.19 A2: Hardware Integrity B2: Network Integrity C2: Cloud/Server Integrity A3: Device Availability B3: Network Availability C3: Cloud/Server Availability A4: Device Authentication B4: Network Authentication C4: Cloud/Server Authentication A5: Device Access Control B5: Network Access Control C5: Cloud/Server Access Control A6: Device Non-Repudiation B6: Network Non-Repudiation C6: Cloud/Server Non-Repudiation Summary of the Threat Matrix xiii Chapter 29 Building Secure IoT Systems 29.1 How to Do Better 29.1.1 Device Registration 29.1.2 Device Identity System 29.1.3 Personal Cloud Middleware 29.1.4 Pseudonymous Data Sharing 29.2 Conclusions 29.3 Principles of IoT Security 412 413 414 414 414 415 415 415 416 417 418 418 419 419 420 420 423 423 424 426 426 427 428 428 About the Authors 431 Index 433 Index duty cycle, 258, 259 frequency hopping, 270 ISM band, 258, 259, 261, 266, 270, 277 link budget, 260 maximum power, 258 output power, 260 passive backscatter, 262 passive communication, 258, 261, 262 path loss, 260 power demand, 255, 256 radio frequency generators, 50 radio jamming, 414 radio waves, 25, 258 receiver antenna gain, 260 signal range, 255, 256, 265 SRD band, 258, 259, 261, 266, 277 transmitter antenna gain, 260 unlicensed band, 258 radio frequency identification, see RFID radio frequency modules, 266, 267 CC1101, 267 current consumption, 267 RFM12B, 267 random numbers, 295, 401 Raspberry Pi, 94, 134, 208 RDBMS, see database Real-time Energy Management via Powerlines and Internet, 254 real-time energy trading, 105 real-time processing, 74, 211, 237, 239, 241, 244, 246, 286, 299, 348, 354, 356 multitasking, 299 received signal strength indication, 190 redox reaction, 164, 205 standard electrode potential, 165 standard hydrogen electrode, 205 register, 70, 300 relay, 69, 177 normally closed, 183 normally open, 183 solid-state relay, 183 switch time, 184 remote access, 101, 103, 120, 150 REMPLI, see Real-time Energy Management via Powerlines and Internet 447 representational state transfer, 320, 324, 326, 328 request / response pattern, 319, 324, 325, 328, 333 Request for Comments, 90 resistance, 18, 46, 159 equivalent series resistance, 49 joint resistance, 17 total resistance, 18 resistor, 46, 155, 197 axial resistor, 48 force-dependent resistor, 48 humistor, 48 light-dependent resistors, 46, 48, 53, 196, 198 photoresistor, 196 power rating, 48 pull-down resistor, 211 pull-up resistor, 211, 230, 232 Steinhart-Hart equation, 198 temperature-dependent resistor, 197 thermistor, 197 transfer resistor, 53 REST, see representational state transfer Restriction of Hazardous Substances Directive, 158, 196 RFC, see Request for Comments 354, 90 524, 90 561, 90 791, 90, 313 792, 90 793, 90, 316 850, 90 1036, 90 2460, 314 6690, 328 7252, 325 7390, 327 7641, 327 RFID, 31, 93, 107, 111, 140, 262, 263 active tags, 262 encoding, 264 frequency, 263 passive tags, 262 right-hand rule, 21 448 RISC, see microprocessor RJ-45, 162, 246, 250 roaming SIM, 146 RoHS, see Restriction of Hazardous Substances Directive ROM, see memory router, 163, 188, 305, 308, 312, 382, 384, 415 RS-232, 223, 228, 229, 238, 286 RS-485, 228, 243–245 RSA, see security RSSI, see received signal strength indication RTC, see integrated circuit RTOS, see operating system SAGE, see semi-automatic ground environment Sagnac effect, 193 SAML, see security sampling rate, 77 SASL, see Simple Authentication and Security Layer satellite, 146, 188, 190, 286 geostationary satellite, 188, 285–287 Low Earth Orbit constellation, 286 satellite communication, 132, 146, 285, 286 base station, 286 frequencies, 287 Globalstar, 286 Iridium, 286 round-trip connection, 286 very small aperture terminals, 286 SCADA, see supervisory control and data acquisition scalability, 136, 347 Schroă dinger equation, wave function, SCSI, see Small Computer System Interface SDH, see Synchronous Digital Hierarchy Secure Sockets Layer, 219, 309 security, 124, 136, 212, 374 access control, 387, 390, 417, 418, 420 Advanced Encryption Standard, 395 asymmetric cryptography, 395 attack surface, 382, 384 attestation, 412, 413, 416, 419, 421, 427 Index authentication, 323, 384, 387–389, 409, 413–416, 421 authenticity, 387 availability, 386, 414 backdoor attack, 412 best practices, 383 big data, 383 block cipher, 395 brute force attack, 394 Caesar cipher, 393 certificate, 387, 400, 405, 406, 409, 425, 426 Certificate Authority, 400, 409 CIA+, 387, 407 cipher suite, 402 ciphertext, 393, 394 confidentiality, 385, 386, 397, 409–412, 420 confidentiality, integrity, availability, 385 consent-based access, 390 context-based security, 419 cryptography, 393, 405 Datagram Transport Layer Security, 404 deanonymisation, 411, 421 deanonymization, 383 denial of service, 386, 414 device identity provider, 424 device shadow, 419 dictionary attack, 424 Diffie-Hellman, 404 Diffie-Hellman key exchange, 395 distributed denial of service attack, 381, 386, 414 Dynamic Client Registration, 415 elliptic curve cryptography, 398, 410 encryption, 385–387, 393, 397, 405 Enigma cipher, 393, 394 ephemeral key, 401, 404 federated identity, 388, 414, 421 fingerprinting, 411 hardware crypto system, 405 Hardware Security Manager, 412, 425 Host Identity Protocol, 417 identity, 387 identity broker, 426 identity provider, 388, 389 Index integrity, 386, 387, 397, 412, 413, 420 key principles for IoT security, 428 keyspace, 394 man-in-the-middle attack, 323, 398, 404 metadata, 412, 419, 420, 427 microcontroller, 409 Mirai botnet, 381, 382, 387, 415 Misfortune Cookie, 384 multi-factor authentication, 387, 388 NAND mirroring, 407 non-repudiation, 387, 391, 419, 427 OAuth, 389 OAuth2, 389, 390, 415, 420, 425, 427 OAuthing, 414, 423, 425–427 OpenID Connect, 389 personal cloud middleware, 427 personal data, 383, 385, 391 personal identity number, 417 PKASSO, 419 plaintext, 393 policy-based access, 390, 418 pre-master key, 404 pre-shared key, 402, 410 prime numbers, 398 privacy, 124, 125, 136, 382–385, 391, 411, 412 privacy by design, 382 private key, 396, 400 public key, 396, 400, 409 public key cryptography, 395, 396, 398 public key encryption, 400 radio transmission, 410 related key attack, 395 remote scanning, 384 reputation, 416, 419 Rijndael cipher, 395 role-based access, 390 RSA public key encryption, 396, 410 Security Assertion Markup Language, 388 security by design, 382 Security Triad, 385 shared key encryption, 393 Shibboleth, 388, 425 side-channel attack, 409 signature, 386, 387, 393, 397, 400 single-sign on, 388, 389 449 social engineering attack, 383 software update, 384 SPINS, 416 spoofing, 386, 414 stalking, 383 stream cipher, 395 Sybil attack, 413, 416 symmetric key encryption, 393, 395, 401, 410 threat matrix, 407 threshold cryptographic system, 409 token-based identity, 388 trusted network, 416 Trusted Platform Module, 413, 426 two-factor authentication, 387 User Managed Access, 419 XML Access Control Markup Language, 390 security by design, 382 Seebeck effect, 199 Semantic Sensor Network Ontology, 374, 378 semi-automatic ground environment, 87 semiconductor electronics, 10, 46, 53, 54, 57, 174 n-p block, 54 n-p junction, 55, 62 n-p-n, 10 p-n block, 10, 54, 174 p-n junction, 10, 51, 53, 55, 57 p-n-p, 10 sensor, 45, 61, 107, 129–131, 161, 187, 207, 225, 240, 243, 256, 269, 275, 291, 297, 328, 348, 354, 355, 359, 384, 390, 411 accelerometer, 192, 194 acidity, 201, 205 altitude, 190, 193 ammeter, 200 barcode, 197 barometric pressure, 192, 193 bioanalytical instruments, 201, 205 carbon-monoxide, 202 chemical sensor, 201 color, 196 current, 191, 200 dew point, 204 450 flex sensor, 195 gyroscope, 192, 194 Hall effect sensor, 200 humidity, 203 hygrometer, 203 inertial measurement unit, 192 kinetic force, 191 lab-on-chip, 201, 205 laser scanner, 197 laser scanning, 196 light, 191, 195, 196 local time, 188 localization, 188, 192 luminosity, 196 magnetic field, 200 magnetometer, 192, 194 measuring chemical properties, 187 measuring physical properties, 187, 191 microphone, 195 motion, 191 negative temperature coefficient, 198 nine degrees of freedom, 192 optoaccoustic measurement, 196 organic compounds, 205, 206 particle quantitation, 202 pH meter, 205 pollution, 202 positive temperature coefficient, 198 potentiometer, 181 pressure, 193, 195 pyrometer, 199 qualitative information, 187 quantitative information, 187 real-time clock, 188 relative time, 188 resolution, 187 rotary encoder, 181 rotation, 192 sensing of fundamental dimensions, 187 sensitivity, 187 sensor drift, 193 sensor fusion, 192 six degrees of freedom, 191 smoke, 202 soil humidity, 204 sound, 191, 195 Index standard platinum resistance thermometer, 198 temperature, 191, 197 tensiometer, 204 thermocouple, 197, 199 tilt switch, 191 translation, 192 vibration, 193, 196 serial communication, 226–229, 238, 243, 266, 267, 269, 279, 283 Serial Line Internet Protocol, 216, 310 Serial Peripheral Interface, see SPI SHA, see security shared medium, 249, 283 SHE, see redox reaction shop floor, 107, 123, 237, 239, 240, 243, 244, 255 Short Message Service, 326 Sigfox, 132, 145, 266, 276 SIM, see subscriber identity module Simple Authentication and Security Layer, 330, 332, 334 Simple Mail Transfer Protocol, 309, 329 Simple Object Access Protocol, 324, 373 sleep mode, 163, 298 SLIP, see Serial Line Internet Protocol Small Computer System Interface, 229 smart building, 104, 118 smart city, 104 smart energy, 105, 107 smart grid, 112 smart home, 118, 383, 415 smart lighting, 113 smart metering, 107 SMC, see electric component SMPS, see power adapter SMS, see cellular data services SMTP, see Simple Mail Transfer Protocol SOAP, see Simple Object Access Protocol SoC, see system-on-chip social media websites, 92, 101 SOIC, see electric component solar panel, 62, 163, 170, 174 joint voltage, 175 maximum power point, 174 solar cell, 174 Index Swanson’s law, 175 solenoid, 183 SONET, see Synchronous Optical Networking SOT, see electric component sound, 196 spectral analysis, 359 SPI, 178, 183, 196, 211, 229, 230, 285 clock phase, 230 clock polarity, 230 CS, 230 DI, 230 DO, 230 MISO, 230 MOSI, 230 SLCK, 230 SS, 230 split brain, 293 SPRT, see sensor SQL, see database SRD, see radio communication SSID, see WiFi SSL, see Secure Sockets Layer, 401 SSO, see security start bit, 227 statistics, 353 average, 361 correlation coefficient, 363 descriptive statistics, 361, 362 Gaussian distribution, 363 median, 361 standard deviation, 361 statistical distribution, 362 statistical properties, 361 statistical test, 362 statisticals significance, 362 Stokes shift, 24 stop bit, 227 stream processing, 348 subscriber identity module, 145, 146 subscription-based service, 117 supervisory control and data acquisition, 93, 337 supply and demand, 120 supply chain management, 101, 107, 110, 123 SVM, see analytics switch, 163 451 synchronous communication, 227 Synchronous Data Link Control, 243 Synchronous Digital Hierarchy, 218, 252 Synchronous Optical Networking, 218, 252 system-on-chip, 73, 207 TCP, 218, 274, 310, 315–317, 326, 330, 334, 337, 339, 341 flow control, 308, 317 handshake, 316 retransmission, 308, 316 TCP/IP, 88, 90, 93, 218, 237–239, 246, 305, 309, 315, 318 TCP/IP model, 216, 219 application layer, 311 internet layer, 310 link layer, 310 transport layer, 310 TDD, see cellular data services TDMA, see time division multiple access telemetry, 254 Telnet, 309 terminator, 138, 237 TFT, see actuator thermoelectric effect, 62 Thread, 257, 270 time division multiple access, 239, 279, 282 TLS, see Transport Layer Security, 332, 334, 337 see Transport Layer Security, 401 token passing, 244 top floor, 107, 244 topology, 137, 141, 239, 294 bus, 138, 229, 244, 245 mesh, 138, 140–142, 257, 268 ring, 138, 230, 238 scatternet, 271 star, 139, 252, 269, 271, 274, 345 TPM, see security traffic management, 114, 123 transformer, 159, 160 transistor, 10, 46, 53, 63, 155, 170, 197 base, 54 bipolar junction, 10 bipolar junction transistor, 53, 69 collector, 54 452 collector-to-base voltage, 57 complementary metal-oxide semiconductor, 69 depletion mode, 57 emitter, 54 emitter-to-base, 57 enhancement mode, 57 field effect transistors, 53 forward bias, 54 gate voltage, 57 ion-sensitive field-effect transistor, 205 metal-oxide-semiconductor, 54, 181 NPN, 54, 55 phototransistor, 57 PNP, 54, 55 reverse bias, 54 reverse voltage, 58 transistor-transistor logic, 69 transition zone, 38 Transmission Control Protocol, see TCP Transport Layer Security, 219, 309, 323, 324, 327, 400–404, 410 Trojan Room Coffee Pot, 92 TTL, see integrated circuit Turing-completeness, 70, 82 UART, see Universal Asynchronous Receiver Transmitter UDP, 218, 246, 310, 325, 328, 404 UI, see user interface UL, see Underwriters Laboratory UMA, see security UMTS, see cellular data services, 281, 284 Underwriters Laboratory, 158 Unicode Transformation Format, 221 unidirectional communication, 137, 230 Uniform Resource Identifiers, 324 universal asynchronous receiver transmitter, 228 Universal Serial Bus, 160, 233, 234 USB adapter/plug system, 234 USB OTG, 235 Unix sockets, 308 unsupervised learning, 367 URI, see Uniform Resource Identifiers USB, see Universal Serial Bus Index User Datagram Protocol, see UDP user experience, 147 user interface, 147, 149, 150 UTF, see Unicode Transformation Format UV radiation, 24, 196 UX, see user experience VDE, see Verband der Elektrotechnik Verband der Elektrotechnik, 158 Verilog, 71 Very Simple Control Protocol, 342 virtual power plant, 105 virtual private network, 146 VNA, see computer voice-activated assistant, 150 voltage drop, 18, 51, 53, 77, 238 voltage regulator, 58 VPN, see virtual private network VSAT, see satellite communication VSCP, see Very Simple Control Protocol wall socket, 160 WAN, see network architecture waste management, 111 water management, 113 wave-particle duality, 25 WCDMA, see cellular data services wearable device, 140, 269, 270 Web 2.0, 92 web browser, 91, 320, 321, 341 web server, 320, 321 Web Services Description Language, 373 websockets, 319, 325, 341 Weightless, 266, 276 WEP, see WiFi wide area network, 313 WiFi, 42, 110, 131, 132, 139, 141, 143, 145, 176, 188, 190, 255, 257, 259, 260, 266, 270, 274, 275, 277, 303, 384, 411 ad hoc network, 274 ESP32, 405 ESP8266, 275, 401, 405, 424 frame types, 274 infrastructure mode, 274 MAC address, 274, 411 Index peak current, 275 range, 275 router, 274, 275 sender power, 274 Service Set Identifier, 274 spectral efficiency, 275 WiFi Protected Access, 274 Wired Equivalent Privacy, 274 WiMAX, see cellular data services wireless communication, see radio communication wireless LAN, see WiFi wireless sensor network, 325 WLAN, see WiFi word size, 69 work (physics), 23 World Wide Web, 319 WPA, see WiFi WSDL, see Web Services Description Language X10, 254 XACML, see security XEP, see XMPP XML, see Extensible Markup Language XMPP, 329–331 Efficient XML Interchange, 331 presence, 331 roster, 329 XML stanza, 329 XMPP Extension Protocols, 330 XMPP Extensions, 329 XMPP Standards Foundation, 329, 330 XSF, see XMPP Z-Wave, 257, 265 ZigBee, 132, 141, 144, 145, 257, 260, 265– 268, 274, 275 data frame, 268 link budget, 267, 269 payload, 268 peak current, 269 self-healing mesh, 268 Xbee module, 269 ZigBee Alliance, 268 ZigBee IP, 269 453 Recent Titles in the Artech House Mobile Communications Series William Webb, Series Editor 3G CDMA2000 Wireless System Engineering, Samuel C Yang 3G Multimedia Network Services, Accounting, and User Profiles, Freddy Ghys, Marcel Mampaey, Michel Smouts, and Arto Vaaraniemi 5G Spectrum and Standards, Geoff Varrall 802.11 WLANs and IP Networking: Security, QoS, and Mobility, Anand R Prasad and Neeli R Prasad Achieving Interoperability in Critical IT and Communications Systems, Robert I Desourdis, Peter J Rosamilia, Christopher P Jacobson, James E Sinclair, and James R McClure Advances in 3G Enhanced Technologies for Wireless Communications, Jiangzhou Wang and Tung-Sang Ng, editors Advances in Mobile Information Systems, John Walker, editor Advances in Mobile Radio Access Networks, Y Jay Guo Applied Satellite Navigation Using GPS, GALILEO, and Augmentation Systems, Ramjee Prasad and Marina Ruggieri Artificial Intelligence in Wireless Communications, Thomas W Rondeau and Charles W Bostian Broadband Wireless Access and Local Network: Mobile WiMax and WiFi, Byeong Gi Lee and Sunghyun Choi CDMA for Wireless Personal Communications, Ramjee Prasad CDMA Mobile Radio Design, John B Groe and Lawrence E Larson CDMA RF System Engineering, Samuel C Yang CDMA Systems Capacity Engineering, Kiseon Kim and Insoo Koo CDMA Systems Engineering Handbook, Jhong S Lee and Leonard E Miller Cell Planning for Wireless Communications, Manuel F Cátedra and Jesús Pérez-Arriaga Cellular Communications: Worldwide Market Development, Garry A Garrard Cellular Mobile Systems Engineering, Saleh Faruque Cognitive Radio Interoperability through Waveform Reconfiguration, Leszek Lechowicz and Mieczyslaw M Kokar Cognitive Radio Techniques: Spectrum Sensing, Interference Mitigation, and Localization, Kandeepan Sithamparanathan and Andrea Giorgetti The Complete Wireless Communications Professional: A Guide for Engineers and Managers, William Webb Digital Communication Systems Engineering with Software-Defined Radio, Di Pu and Alexander M Wyglinski EDGE for Mobile Internet, Emmanuel Seurre, Patrick Savelli, and Pierre-Jean Pietri Emerging Public Safety Wireless Communication Systems, Robert I Desourdis, Jr., et al The Future of Wireless Communications, William Webb Geographic Information Systems Demystified, Stephen R Galati Geospatial Computing in Mobile Devices, Ruizhi Chen and Robert Guinness GPRS for Mobile Internet, Emmanuel Seurre, Patrick Savelli, and Pierre-Jean Pietri GPRS: Gateway to Third Generation Mobile Networks, Gunnar Heine and Holger Sagkob GSM and Personal Communications Handbook, Siegmund M Redl, Matthias K Weber, and Malcolm W Oliphant GSM Networks: Protocols, Terminology, and Implementation, Gunnar Heine GSM System Engineering, Asha Mehrotra Handbook of Land-Mobile Radio System Coverage, Garry C Hess Handbook of Mobile Radio Networks, Sami Tabbane High-Speed Wireless ATM and LANs, Benny Bing Inside Bluetooth Low Energy, Second Edition, Naresh Gupta Interference Analysis and Reduction for Wireless Systems, Peter Stavroulakis Internet Technologies for Fixed and Mobile Networks, Toni Janevski Introduction to 3G Mobile Communications, Second Edition, Juha Korhonen Introduction to 4G Mobile Communications, Juha Korhonen Introduction to Communication Systems Simulation, Maurice Schiff Introduction to Digital Professional Mobile Radio, Hans-Peter A Ketterling Introduction to GPS: The Global Positioning System, Ahmed El-Rabbany An Introduction to GSM, Siegmund M Redl, Matthias K Weber, and Malcolm W Oliphant Introduction to Mobile Communications Engineering, José M Hernando and F Pérez-Fontán Introduction to Radio Propagation for Fixed and Mobile Communications, John Doble Introduction to Wireless Local Loop, Broadband and Narrowband, Systems, Second Edition, William Webb IS-136 TDMA Technology, Economics, and Services, Lawrence Harte, Adrian Smith, and Charles A Jacobs Location Management and Routing in Mobile Wireless Networks, Amitava Mukherjee, Somprakash Bandyopadhyay, and Debashis Saha LTE Air Interface Protocols, Mohammad T Kawser Metro Ethernet Services for LTE Backhaul, Roman Krzanowski Mobile Data Communications Systems, Peter Wong and David Britland Mobile IP Technology for M-Business, Mark Norris Mobile Satellite Communications, Shingo Ohmori, Hiromitsu Wakana, and Seiichiro Kawase Mobile Telecommunications Standards: GSM, UMTS, TETRA, and ERMES, Rudi Bekkers Mobile-to-Mobile Wireless Channels, Alenka Zajic′ Mobile Telecommunications: Standards, Regulation, and Applications, Rudi Bekkers and Jan Smits Multiantenna Digital Radio Transmission, Massimiliano Martone Multiantenna Wireless Communications Systems, Sergio Barbarossa Multi-Gigabit Microwave and Millimeter-Wave Wireless Communications, Jonathan Wells Multipath Phenomena in Cellular Networks, Nathan Blaunstein and Jørgen Bach Andersen Multiuser Detection in CDMA Mobile Terminals, Piero Castoldi OFDMA for Broadband Wireless Access, Slawomir Pietrzyk Personal Wireless Communication with DECT and PWT, John Phillips and Gerard MacNamee Practical Wireless Data Modem Design, Jonathon Y C Cheah Prime Codes with Applications to CDMA Optical and Wireless Networks, Guu-Chang Yang and Wing C Kwong Quantitative Analysis of Cognitive Radio and Network Performance, Preston Marshall QoS in Integrated 3G Networks, Robert Lloyd-Evans Radio Engineering for Wireless Communication and Sensor Applications, Antti V Räisänen and Arto Lehto Radio Propagation in Cellular Networks, Nathan Blaunstein Radio Resource Management for Wireless Networks, Jens Zander and Seong-Lyun Kim Radiowave Propagation and Antennas for Personal Communications, Third Edition, Kazimierz Siwiak and Yasaman Bahreini RDS: The Radio Data System, Dietmar Kopitz and Bev Marks Resource Allocation in Hierarchical Cellular Systems, Lauro Ortigoza-Guerrero and A Hamid Aghvami RF and Baseband Techniques for Software-Defined Radio, Peter B Kenington RF and Microwave Circuit Design for Wireless Communications, Lawrence E Larson, editor RF Positioning: Fundamentals, Applications, and Tools, Rafael Saraiva Campos and Lisandro Lovisolo Sample Rate Conversion in Software Configurable Radios, Tim Hentschel Signal Processing Applications in CDMA Communications, Hui Liu Signal Processing for RF Circuit Impairment Mitigation, Xinping Huang, Zhiwen Zhu, and Henry Leung Smart Antenna Engineering, Ahmed El Zooghby Software Defined Radio for 3G, Paul Burns Spread Spectrum CDMA Systems for Wireless Communications, Savo G Glisic and Branka Vucetic Technical Foundations of the Internet of Things, Boris Adryan, Dominik Obermaier, and Paul Fremantle Technologies and Systems for Access and Transport Networks, Jan A Audestad Third-Generation and Wideband HF Radio Communications, Eric E Johnson, Eric Koski, William N Furman, Mark Jorgenson, and John Nieto Third Generation Wireless Systems, Volume 1: Post-Shannon Signal Architectures, George M Calhoun Traffic Analysis and Design of Wireless IP Networks, Toni Janevski Transmission Systems Design Handbook for Wireless Networks, Harvey Lehpamer UMTS and Mobile Computing, Alexander Joseph Huber and Josef Franz Huber Understanding Cellular Radio, William Webb Understanding Digital PCS: The TDMA Standard, Cameron Kelly Coursey Understanding GPS: Principles and Applications, Second Edition, Elliott D Kaplan and Christopher J Hegarty, editors Understanding WAP: Wireless Applications, Devices, and Services, Marcel van der Heijden and Marcus Taylor, editors Universal Wireless Personal Communications, Ramjee Prasad WCDMA: Towards IP Mobility and Mobile Internet, Tero Ojanperä and Ramjee Prasad, editors Wireless Communications in Developing Countries: Cellular and Satellite Systems, Rachael E Schwartz Wireless Communications Evolution to 3G and Beyond, Saad Z Asif Wireless Intelligent Networking, Gerry Christensen, Paul G Florack, and Robert Duncan Wireless LAN Standards and Applications, Asunción Santamaría and Francisco J López-Hernández, editors Wireless Sensor and Ad Hoc Networks Under Diversified Network Scenarios, Subir Kumar Sarkar Wireless Technician’s Handbook, Second Edition, Andrew Miceli For further information on these and other Artech House titles,including previously considered out-of-print books now available through our In-Print-Forever® (IPF®) program, contact: Artech House 685 Canton Street Norwood, MA 02062 Phone: 781-769-9750 Fax: 781-769-6334 e-mail: artech@artechhouse.com Artech House 16 Sussex Street London SW1V 4RW UK Phone: +44 (0)20 7596-8750 Fax: +44 (0)20 7630-0166 e-mail: artech-uk@artechhouse.com Find us on the World Wide Web at: www.artechhouse.com ... "smart" Part III Applications of M2M and IoT CORE M2M AND IOT xxviii The Technical Foundations of IoT Preface by Boris Adryan xxix in the process of addressing them the book will teach you vocabulary... Following the historical development of computer networking, we xxvi The Technical Foundations of IoT will see how the first experimental connection between computers led to the creation of the Internet,... whatever there was in Alberts (The Molecular Biology of The Cell), Stryer (Biochemistry), Gilbert (Developmental Biology) and a few others, most of which xxiii xxiv The Technical Foundations of IoT
- Xem thêm -

Xem thêm: The technical foundation of iot , The technical foundation of iot

Gợi ý tài liệu liên quan cho bạn