<p> Foreword xxvi<br> Introduction xxviii<br>Part I Introduction to IoT 1<br>Chapter 1 What Is IoT? 3<br> Genesis of IoT 4<br> IoT and Digitization 6<br> IoT Impact 7<br> Connected Roadways 8<br> Connected Factory 12<br> Smart Connected Buildings 15<br> Smart Creatures 19<br> Convergence of IT and OT 21<br> IoT Challenges 23<br> Summary 24<br> References 24<br>Chapter 2 IoT Network Architecture and Design 27<br> Drivers Behind New Network Architectures 28<br> Scale 30<br> Security 31<br> Constrained Devices and Networks 32<br> Data 32<br> Legacy Device Support 32<br> Comparing IoT Architectures 33<br> The oneM2M IoT Standardized Architecture 33<br> The IoT World Forum (IoTWF) Standardized Architecture 35<br> Additional IoT Reference Models 39<br> A Simplified IoT Architecture 40<br> The Core IoT Functional Stack 43<br> Layer 1: Things: Sensors and Actuators Layer 44<br> Layer 2: Communications Network Layer 46<br> Layer 3: Applications and Analytics Layer 59<br> IoT Data Management and Compute Stack 63<br> Fog Computing 65<br> Edge Computing 68<br> The Hierarchy of Edge, Fog, and Cloud 68<br> Summary 70<br> References 71<br>Part II Engineering IoT Networks 73<br>Chapter 3 Smart Objects: The “Things” in IoT 75<br> Sensors, Actuators, and Smart Objects 76<br> Sensors 76<br> Actuators 81<br> Micro-Electro-Mechanical Systems (MEMS) 83<br> Smart Objects 84<br> Sensor Networks 87<br> Wireless Sensor Networks (WSNs) 88<br> Communication Protocols for Wireless Sensor Networks 92<br> Summary 93<br>Chapter 4 Connecting Smart Objects 95<br> Communications Criteria 96<br> Range 96<br> Frequency Bands 98<br> Power Consumption 101<br> Topology 102<br> Constrained Devices 103<br> Constrained-Node Networks 104<br> IoT Access Technologies 107<br> IEEE 802.15.4 108<br> IEEE 802.15.4g and 802.15.4e 118<br> IEEE 1901.2a 124<br> IEEE 802.11ah 130<br> LoRaWAN 134<br> NB-IoT and Other LTE Variations 142<br> Summary 146<br>Chapter 5 IP as the IoT Network Layer 149<br> The Business Case for IP 150<br> The Key Advantages of Internet Protocol 150<br> Adoption or Adaptation of the Internet Protocol 152<br> The Need for Optimization 154<br> Constrained Nodes 155<br> Constrained Networks 156<br> IP Versions 157<br> Optimizing IP for IoT 159<br> From 6LoWPAN to 6Lo 159<br> Header Compression 161<br> Fragmentation 162<br> Mesh Addressing 163<br> 6TiSCH 165<br> RPL 167<br> Authentication and Encryption on Constrained Nodes 173<br> Profiles and Compliances 174<br> Internet Protocol for Smart Objects (IPSO) Alliance 174<br> Wi-SUN Alliance 174<br> Thread 174<br> IPv6 Ready Logo 175<br> Summary 175<br>Chapter 6 Application Protocols for IoT 177<br> The Transport Layer 178<br> IoT Application Transport Methods 180<br> Application Layer Protocol Not Present 180<br> SCADA 182<br> Generic Web-Based Protocols 189<br> IoT Application Layer Protocols 191 <br> Summary 204<br>Chapter 7 Data and Analytics for IoT 205<br> An Introduction to Data Analytics for IoT 206<br> Structured Versus Unstructured Data 207<br> Data in Motion Versus Data at Rest 209<br> IoT Data Analytics Overview 209<br> IoT Data Analytics Challenges 211<br> Machine Learning 212<br> Machine Learning Overview 212<br> Machine Learning and Getting Intelligence from Big Data 218<br> Predictive Analytics 220<br> Big Data Analytics Tools and Technology 220<br> Massively Parallel Processing Databases 222<br> NoSQL Databases 223<br> Hadoop 224<br> The Hadoop Ecosystem 227<br> Edge Streaming Analytics 230<br> Comparing Big Data and Edge Analytics 231<br> Edge Analytics Core Functions 232<br> Distributed Analytics Systems 235<br> Network Analytics 236<br> Flexible NetFlow Architecture 238<br> Summary 242<br> References 243<br>Chapter 8 Securing IoT 245<br> A Brief History of OT Security 246<br> Common Challenges in OT Security 249<br> Erosion of Network Architecture 249<br> Pervasive Legacy Systems 250<br> Insecure Operational Protocols 250<br> Other Protocols 253<br> Device Insecurity 254<br> Dependence on External Vendors 255<br> Security Knowledge 256<br> How IT and OT Security Practices and Systems Vary 256<br> The Purdue Model for Control Hierarchy 257<br> OT Network Characteristics Impacting Security 259<br> Security Priorities: Integrity, Availability, and Confidentiality 261<br> Security Focus 261<br> Formal Risk Analysis Structures: OCTAVE and FAIR 262<br> OCTAVE 262<br> FAIR 265<br> The Phased Application of Security in an Operational Environment 266<br> Secured Network Infrastructure and Assets 266<br> Deploying Dedicated Security Appliances 269<br> Higher-Order Policy Convergence and Network Monitoring 272<br> Summary 274<br>Part III IoT in Industry 275<br>Chapter 9 Manufacturing 277<br> An Introduction to Connected Manufacturing 278<br> An IoT Strategy for Connected Manufacturing 279<br> Business Improvements Driven Through IoT 281<br> An Architecture for the Connected Factory 282<br> Industrial Automation and Control Systems Reference Model 282<br> The CPwE Reference Model 284<br> CPwE Resilient Network Design 286<br> CPwE Wireless 289<br> Industrial Automation Control Protocols 293<br> EtherNet/IP and CIP 293<br> PROFINET 294<br> The PROFINET Architecture 296<br> Media Redundancy Protocol (MRP) 297<br> Modbus/TCP 298<br> Connected Factory Security 299<br> A Holistic Approach to Industrial Security 299<br> Edge Computing in the Connected Factory 304<br> Connected Machines and Edge Computing 304<br> Summary 307<br> References 307<br>Chapter 10 Oil and Gas 309<br> An Introduction to the Oil and Gas Industry 310<br> Defining Oil and Gas 310<br> The Oil and Gas Value Chain 313<br> Current Trends in the Oil and Gas Industry 314<br> Industry Key Challenges as Digitization Drivers 316<br> IoT and the Oil and Gas Industry 319<br> Improving Operational Efficiency 321<br> The Purdue Model for Control Hierarchy in Oil and Gas Networks 321<br> Oil and Gas Use Cases for IoT 323<br> IoT Architectures for Oil and Gas 326<br> Control Room Networks for Oil and Gas 327<br> Wired Networks for Oil and Gas 328<br> Wireless Networks for Oil and Gas 328<br> Wireless Use Cases in the Oil and Gas Industry 332<br> The Risk Control Framework for Cybersecurity in IoT 335<br> Securing the Oil and Gas PCN: Background 337<br> Securing the Oil and Gas PCN: Use Cases and Requirements 338<br> Data Analytics for Predictive Asset Monitoring 341<br> Summary 342<br> References 343<br>Chapter 11 Utilities 345<br> An Introduction to the Power Utility Industry 347<br> The IT/OT Divide in Utilities 348<br> The GridBlocks Reference Model 350<br> GridBlocks: An 11-Tiered Reference Architecture 352<br> The Primary Substation GridBlock and Substation Automation 356<br> SCADA 357<br> IEC 61850: The Modernization of Substation Communication<br> Standards 358<br> Network Resiliency Protocols in the Substation 362<br> System Control GridBlock: The Substation WAN 364<br> Defining Teleprotection 364<br> Designing a WAN for Teleprotection 367<br> The Field Area Network (FAN) GridBlock 369<br> Advanced Metering Infrastructure 371<br> Other Use Cases 373<br> Securing the Smart Grid 377<br> NERC CIP 378<br> Smart Grid Security Considerations 380<br> The Future of the Smart Grid 381<br> Summary 382<br> References 383<br>Chapter 12 Smart and Connected Cities 385<br> An IoT Strategy for Smarter Cities 386<br> Vertical IoT Needs for Smarter Cities 386<br> Global vs. Siloed Strategies 389<br> Smart City IoT Architecture 390<br> Street Layer 391<br> City Layer 394<br> Data Center Layer 395<br> Services Layer 397<br> On-Premises vs. Cloud 398<br> Smart City Security Architecture 398<br> Smart City Use-Case Examples 401<br> Connected Street Lighting 401<br> Connected Environment 409<br> Summary 411<br> References 412<br>Chapter 13 Transportation 413<br> Transportation and Transports 413<br> Transportation Challenges 415<br> Roadways 415<br> Mass Transit 416<br> Rail 417<br> Challenges for Transportation Operators and Users 418<br> IoT Use Cases for Transportation 420<br> Connected Cars 421<br> Connected Fleets 422<br> Infrastructure and Mass Transit 422<br> An IoT Architecture for Transportation 427<br> IoT Technologies for Roadways 427<br> Connected Roadways Network Architecture 434<br> Extending the Roadways IoT Architecture to Bus Mass Transit 440<br> Extending Bus IoT Architecture to Railways 442<br> Summary 447<br> References 448<br>Chapter 14 Mining 449<br> Mining Today and Its Challenges 451<br> Scale 451<br> Safety 455<br> Environment 455<br> Security 456<br> Volatile Markets 456<br> Challenges for IoT in Modern Mining 456<br> The OT Roles in Mining 456<br> Connectivity 457<br> An IoT Strategy for Mining 459<br> Improved Safety and Location Services 459<br> Location Services 461<br> Improved Efficiencies 464<br> Improved Collaboration 465<br> IoT Security for Mining 466<br> An Architecture for IoT in Mining 467<br> IEEE 802.11 as the IoT Access Layer 468<br> 802.11 Outdoor Wireless Mesh 468<br> 4G/LTE 474<br> Wireless in Underground Mining 475<br> Industrial Wireless 476<br> Isolated vs. Connected Mine Networks 476<br> Core Network Connectivity 478<br> Network Design Consideration for Mining Applications 479<br> Data Processing 480<br> Summary 481<br>Chapter 15 Public Safety 483<br> Overview of Public Safety 484<br> Public Safety Objects and Exchanges 484<br> Public and Private Partnership for Public Safety IoT 486<br> Public Safety Adoption of Technology and the IoT 488<br> An IoT Blueprint for Public Safety 489<br> Mission Continuum 489<br> Mission Fabric 490<br> Inter-agency Collaboration 491<br> Emergency Response IoT Architecture 493<br> Mobile Command Center 494<br> Mobile Vehicles: Land, Air, and Sea 501<br> IoT Public Safety Information Processing 506<br> School Bus Safety 508<br> Bus Location and Student Onboarding/Offboarding 508<br> Driver Behavior Reporting 510<br> Diagnostic Reporting 511<br> Video Surveillance 511<br> Student Wi-Fi 513<br> Push-to-Talk Communication 513<br> School Bus Safety Network Architecture 513<br> Summary 514<br> Reference 515<br>9781587144561, TOC, 5/16/2017<br></p>