|
Dedication |
5 |
|
|
Preface |
6 |
|
|
Acknowledgements |
8 |
|
|
Contents |
9 |
|
|
Chapter 1: The IoT Landscape |
11 |
|
|
1.1 What Is IoT? |
11 |
|
|
1.2 Applications |
12 |
|
|
1.3 Architectures |
14 |
|
|
1.4 Wireless Networks |
14 |
|
|
1.5 Devices |
14 |
|
|
1.6 Security and Privacy |
15 |
|
|
1.7 Event-Driven Systems |
15 |
|
|
1.8 This Book |
16 |
|
|
Reference |
16 |
|
|
Chapter 2: IoT System Architectures |
17 |
|
|
2.1 Introduction |
17 |
|
|
2.2 Protocols Concepts |
17 |
|
|
2.3 IoT-Oriented Protocols |
20 |
|
|
2.4 Databases |
22 |
|
|
2.5 Time Bases |
23 |
|
|
2.6 Security |
23 |
|
|
References |
24 |
|
|
Chapter 3: IoT Devices |
26 |
|
|
3.1 The IoT Device Design Space |
26 |
|
|
3.2 Cost of Ownership and Power Consumption |
27 |
|
|
3.3 Cost per Transistor and Chip Size |
28 |
|
|
3.4 Duty Cycle and Power Consumption |
29 |
|
|
3.5 Platform Design |
31 |
|
|
3.6 Summary |
31 |
|
|
References |
31 |
|
|
Chapter 4: Event-Driven System Analysis |
33 |
|
|
4.1 Introduction |
33 |
|
|
4.2 Previous Work |
34 |
|
|
4.3 Motivating Example |
35 |
|
|
4.4 IoT Network Model |
35 |
|
|
4.4.1 Events |
35 |
|
|
4.4.2 Networks |
36 |
|
|
4.4.3 Devices and Hubs |
36 |
|
|
4.4.4 Single-Hub Networks |
37 |
|
|
4.4.5 Multi-hub Networks |
37 |
|
|
4.4.6 Network Models and Physical Networks |
38 |
|
|
4.5 IoT Event Analysis |
38 |
|
|
4.5.1 Event Populations |
38 |
|
|
4.5.2 Stochastic Event Populations |
40 |
|
|
4.5.3 Environmental Interaction Modeling |
42 |
|
|
4.5.4 Event Transport and Migration |
42 |
|
|
References |
44 |
|
|
Chapter 5: Industrial Internet of Things |
45 |
|
|
5.1 Introduction |
45 |
|
|
5.2 Industrie 4.0 |
47 |
|
|
5.3 Industrial Internet of Things (IIoT) |
49 |
|
|
5.4 IIoT Architecture |
50 |
|
|
5.5 Basic Technologies |
57 |
|
|
5.6 Applications and Challenges |
58 |
|
|
References |
60 |
|
|
Chapter 6: Security and Safety |
63 |
|
|
6.1 Introduction |
63 |
|
|
6.2 Systems Security |
68 |
|
|
6.3 Network Security |
70 |
|
|
6.4 Generic Application Security |
72 |
|
|
6.5 Application Process Security and Safety |
73 |
|
|
6.6 Reliable-and-Secure-by-Design IoT Applications |
74 |
|
|
6.7 Run-Time Monitoring |
75 |
|
|
6.8 The ARMET Approach |
76 |
|
|
6.9 Privacy and Dependability |
80 |
|
|
References |
81 |
|
|
Chapter 7: Security Testing IoT Systems |
85 |
|
|
7.1 Introduction |
85 |
|
|
7.2 Fuzz Testing for Security |
86 |
|
|
7.2.1 White-Box Fuzzing |
88 |
|
|
7.2.2 Black-Box Fuzzing |
88 |
|
|
7.3 Fuzzing Industrial Control Network Systems |
90 |
|
|
7.4 Fuzzing Modbus |
90 |
|
|
7.4.1 The Modbus Protocol |
90 |
|
|
7.4.2 Modbus/TCP Fuzzer |
93 |
|
|
References |
94 |
|
|
Index |
98 |
|