logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Internet of Things: Architectures, Protocols and Standards

Internet of Things: Architectures, Protocols and Standards (Hardcover)

Gianluigi Ferrari, Marco Picone, Simone Cirani, Luca Veltri (지은이)
John Wiley & Sons Inc
229,260원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
187,990원 -18% 0원
9,400원
178,590원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Internet of Things: Architectures, Protocols and Standards
eBook 미리보기

책 정보

· 제목 : Internet of Things: Architectures, Protocols and Standards (Hardcover) 
· 분류 : 외국도서 > 기술공학 > 기술공학 > 모바일/무선통신
· ISBN : 9781119359678
· 쪽수 : 408쪽
· 출판일 : 2018-11-05

목차

1 Preliminaries, Motivation, and Related Work 1

1.1 What is the Internet of Things? 1

1.2 Wireless Ad-hoc and Sensor Networks: the Ancestors without IP 1

1.3 IoT-enabled applications 2

1.3.1 Home and Building Automation 3

1.3.2 Smart Cities 3

1.3.3 Smart Grid 3

1.3.4 Industrial IoT 4

1.3.5 Smart Farming 5

2 Standards 7

2.1 “Traditional” Internet review 7

2.1.1 Physical/Link Layer 8

2.1.2 Network Layer 11

2.1.3 Transport Layer 13

2.1.4 Application Layer 16

2.2 Internet of Things 19

2.2.1 Architecting an IP-based Internet of Things 20

2.2.2 Physical/Link Layer 21

2.2.3 Network Layer 25

2.2.4 Transport Layer 26

2.2.5 Application Layer 26

2.3 Industrial Internet of Things 59

3 Interoperability 61

3.1 Applications in the Internet of Things 61

3.2 The verticals: Cloud-based solutions 61

3.3 REST architectures: the Web of Things 63

3.3.1 REST: the Web as a platform 64

3.3.2 Richardson maturity model 68

3.4 The Web of Things 76

3.5 Messaging Queues and Publish/Subscribe Communications 77

3.5.1 Advantages of Pub/Sub 77

3.5.2 Disadvantages of Pub/Sub 78

3.5.3 MQTT 78

3.6 Session Initiation for the Internet of Things 80

3.6.1 Motivations 80

3.6.2 Lightweight Sessions in IoT 81

3.7 Performance Evaluation 86

3.7.1 Implementation 86

3.7.2 Experimental results 87

3.7.3 Conclusions 90

3.8 Optimized communications: a Data-driven IoT-oriented Dual-network Management Protocol 90

3.8.1 DNMP Motivations 91

3.8.2 Related Work 92

3.8.3 The DNMP Protocol 93

3.8.4 Implementation with IEEE 802.15.4 and IEEE 802.11s 97

3.8.5 Performance evaluation 99

3.8.6 IEEE 802.15.4-controlled Selective Activation of the IEEE 802.11s Network 103

3.8.7 Conclusions 104

3.9 Discoverability in Constrained Environments 105

3.9.1 CoRE Link Format 105

3.9.2 CoRE interfaces 108

3.10 Data formats - Media Types for Sensor Markup Language (SenML) 110

4 Discoverability 115

4.1 Service and Resource Discovery 115

4.2 Local and Large-scale Service Discovery 116

4.2.1 ZeroConf 119

4.2.2 UPnP 120

4.2.3 URI Beacons and the Physical Web 120

4.3 A scalable and self-configuring architecture for service discovery in the Internet of Things 122

4.3.1 IoT Gateway 123

4.3.2 A P2P-based Large Scale Service Discovery Architecture 126

4.3.3 Zeroconf-based Local Service Discovery for Constrained Environments 132

4.3.4 Implementation results 135

4.4 Lightweight Service Discovery in Low-power IoT Networks 142

4.4.1 Efficient Forwarding Protocol for Service Discovery 144

4.4.2 Efficient Multiple Unicast Forwarding 146

4.5 Implementation Results 148

5 Security and Privacy in the IoT 153

5.1 Security issues in the IoT 153

5.2 Security mechanisms overview 156

5.2.1 Traditional vs. Lightweight security 157

5.2.2 Lightweight cryptography 162

5.2.3 Key Agreement, Distribution, and Security Bootstrapping 173

5.2.4 Processing Data in the Encrypted Domain: Secure Data Aggregation 174

5.2.5 Authorization Mechanisms for Secure IoT Services 176

5.3 Privacy issues in the IoT (confidentiality, aggregation, pseudonymity and anonymity) 179

5.4 The role of authorization 179

5.4.1 IoT-OAS: A delegation-based authorization framework for the Internet of Things 182

5.4.2 Application Scenarios 187

6 Cloud and Fog Computing for the Internet of Things 191

6.1 Cloud Computing 191

6.2 Big Data Processing Pattern 192

6.3 Big Stream 193

6.3.1 Big Stream-Oriented Architecture 195

6.3.2 Graph-based Processing 198

6.3.3 Implementation 200

6.3.4 Performance Evaluation 207

6.3.5 Solutions and Security Considerations 209

6.4 Big Stream and Security 212

6.4.1 Graph-based Cloud System Security 213

6.4.2 Normalization after a Secure Stream Acquisition with OFS Module 215

6.4.3 Enhancing Application Register with IGS Module 216

6.4.4 Securing Stream inside Graph Nodes 218

6.4.5 Evaluation of a Secured Big Stream Architecture 221

6.5 Fog Computing and IoT 225

6.6 The Role of the IoT Hub 227

6.6.1 Virtualization and Replication 228

7 IoT in Practice 243

7.1 Hardware for the IoT 243

7.1.1 Classes of Constrained Devices 245

7.1.2 Hardware Platforms 246

7.2 Software for the IoT 256

7.2.1 Contiki OS 259

7.3 Vision and Architecture of a Testbed for the Web of Things 261

7.3.1 An All IP-based Infrastructure for Smart Objects 264

7.3.2 Enabling interactions with Smart Objects through the IoT Hub 265

7.3.3 Testbed Access and Security 267

7.3.4 Exploiting the Testbed: Building WoT Applications for Mobile and Wearable Devices 268

7.3.5 Open Challenges and Future Vision 270

7.4 Wearable Computing for the Internet of Things: Interaction Patterns with Smart Objects in RESTful Environments 271

7.4.1 Shaping the Internet of Things in a Mobile-Centric World 271

7.4.2 Interaction Patterns with Smart Objects through Wearable Devices 272

7.4.3 Implementation in a real-world IoT testbed 275

7.5 Effective Authorization for the Web of Things 278

7.5.1 Authorization Framework Architecture 281

7.5.2 Implementation and Validation 283

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책