Index

Symbols

3GPP user equipment categories 251, 252

4G LTE

Cat-0 270, 271, 272

Cat-1 270, 272

Cat-M1 270

dataflow 266, 267, 269

E-UTRAN protocol stack 264, 265, 266

geographical areas 266, 267, 269

handover procedures 266, 267, 269

LTE Cat-M1 (eMTC) 273, 274

LTE Cat-NB 274, 275, 276

NB-IoT 270

packet structure 270

spectrum allocation and bands 252, 254, 256, 257, 258, 259

topology and architecture 259, 260, 261, 262, 263, 264

5G

about 279, 280, 284

core architecture 291, 292

energy considerations 298, 299, 300

fine-grain time-division duplexing (TDD) 295, 296

frequency distribution 284, 285, 286, 288, 289

low-latency HARQ 295, 296

network slicing 297

RAN architecture 289, 290, 291

reference link 280

security and registration 293

Ultra-Reliable Low-Latency Communications (URLCC) 294, 295

6LoWPAN

functions 230

header compression and fragmentation 236, 237, 238

mesh addressing and routing 233, 235

node types 231

protocol stack 232

security 241

topology 229

8-phase differential phase-shift keying (8DPSK) 122

24-bit ADC 71

802.11ah network

relay node 228

root access point 227

STA 227

802.15 standards 112, 113

A

access control list (ACL) 175

access control lists (ACL) 184

access point (AP) 198

ACK filtering 379

Activation by Personalization (ABP) 304

active sensing systems 58

Adaptive Data Rate (ADR) 302

Adaptive frequency hopping (AFH) 122

Adaptive frequency hopping spread spectrum (AFH) 115

additive white Gaussian noise (AWGN) 97

address space layout randomization (ASLR) 531

Ad Hoc On-Demand Distance Vector (AODV) 148, 183

Advanced Encryption Standard (AES) , 342, 537

Advanced Message Queuing Protocol (AMQP)

about 428, 429, 430

URL 428

Advanced Vector Extensions (AVX) 328

Advantech

URL

AdvDataInfo (ADI) 166

advertiser 116

AES Counter Mode (AES-CTR) 540

aggregating gateway

about 413

advertisement 414

discovery 414

agricultural and environment

about 16

IoT use cases 17

Akraino Edge Stack 459

Allseen Alliance 569

Amazon

URL

Amazon Greengrass 460, 462

ambient computing 359

AMD

URL 580

AMP-specific stack

AMP MAC 121

AMP manager 121

AMP PAL 121

AMP (PHY) 121

Analog Devices

URL 579

analog-to-digital converters (ADC) 204

analytics 47, 48

angle of arrival (AoA) 156

angle of departure (AoD) 156

application binary interface (ABI) 347

application objects 181

approval 560

architectural board (AB) 570

arithmetic logic unit (ALU) 322

ARM

URL 580

ARM AArch64 Neon SIMD instructions

examining 328

ARM TrustZone 530

association 184

association identifier (AID) assignment 226

asymmetric cryptography 542, 544, 546

asymmetric protocol 396

attack and threat termscyber security

amplification attack 518

ARP spoof 518

banner scans 518

botnets 518

brute force 518

buffer overflow 518

C2 518

correlation power analysis attack 518

dictionary attack 519

distributed denial-of-service (DDoS) 519

fuzzing 519

man-in-the-middle attack (MITM) 519

NOP sleds 519

RCE exploit 519

replay attack 519

return-oriented programming (ROP) attack 519

return-to-libc 520

rootkit 520

side-channel attack 520

social engineering 520

spoofing 520

SQL injection 520

SYN flood 520

XSS (cross-site scripting) 520

zero-day exploits 520

Authentication Handler (AH) 241

Authentication Initiation Request (5G-AIR) 293

autonomous 37

B

BACnet

URL 568

Baetyl 459

Bandwidth Limited region 98

baseband unit (BBU) 291

Basic Rate / Enhanced Data Rate (BR/EDR) mode 117

batch 507

batch processing 477

batteries 83

battery capacity 81, 83

Bayesian models 495, 497

beacon interval (BO) 170

beamforming methods, IEEE 802.11

explicit feedback beamforming 210

implicit feedback beamforming 210

best-effort delivery 193

bidirectional transport (BDT) 227

binary frequency-shift keying (BPSK) 202

binding 428

Bitcoin mining 555

bit error rate (BER) 99, 100, 101, 204

bitrate limits 95

BLE roles

about 128

GAP layer roles (pre-connection) 128

GATT Layer Roles (post connection 128

link layer roles (pre-connection) 128

BLE security 136

Bluetooth

about 114, 566

BLE roles 128

BR/EDR operation 126, 127

history 114, 115, 116

packet structure 124

profiles 133

URL 566

Bluetooth 1.0 and 1.0B 115

Bluetooth 1.1 115

Bluetooth 1.2 115

Bluetooth 2.0 115

Bluetooth 2.1 115

Bluetooth 3.0 115

Bluetooth 4.0 115

Bluetooth 4.1 116

Bluetooth 4.2 116

Bluetooth 5

communication process 116, 117

interference 121, 122, 123

PHY 121, 122, 123

range and speed enhancement 143, 144, 145

stack 118

topologies 117, 118

Bluetooth 5.0 116

Bluetooth 5.1 116

about 155

direction finding 156, 157, 158, 159, 160

GATT caching 161, 162

minor enhancements 165, 166

periodic advertising sync transfer 163, 165

randomized advertising channel indexing 162

Bluetooth beaconing 137, 138, 139, 140, 141, 142, 143

Bluetooth events, transpiring in Bluetooth WPAN

advertising 116

connecting 116

extended advertising 117

periodic advertising 117

Bluetooth Low Energy (BLE) 93, 114, 444

summarizing 25

Bluetooth Low Energy (BLE) mode

states 129, 130, 131

Bluetooth mesh

about 145

layers 146

provisioning 154

topology 148, 149, 151

Bluetooth mesh, addressing modes

about 151

group addressing 152

unicast addressing 151

virtual addressing 152

Bluetooth mesh, entities 149

elements 149

mesh gateway 149

nodes 149

unprovisioned devices 149

Bluetooth, operation modes

Alternative MAC/PHY (AMP) 119

Basic Rate/Enhanced Data Rate mode (BR/EDR) 119

Low Energy (LE) mode 119

Bluetooth SIG

URL 114

Bluetooth stack

elements 118

profiles 118

protocols 118

board support package (BSP) 347

bootstrap aggregating (bagging) 494

Border Gateway Protocol (BGP) 363

border router 230

Bosch

URL 579

BR/EDR mode

authentication 135

encryption 136

BR/EDR operation 126, 127

BR/EDR security 135

broadcast routing 363

Broadcom

URL 579

business rule management systems (BRMSs) 473

C

caches 325

carrier sense multiple access with collision avoidance (CSMA/CA) 168

Cat-NB

versus Cat-M1 274, 275

CCA mode 1 171

CCA mode 2 171

CCA mode 3 171

CCA mode 4 171

CCA Mode 5 171

cell array 337

cellular access technologies

about 249

code-division multiple access (CDMA) 249

frequency-division multiple access (FDMA 249

time-division multiple access (TDMA) 249

cellular connectivity

about 244

Cellular Internet of Things (CIoT) 274

central unit (CU) 291

certificate authorities (CA) 548

chaining method 473

Chain Reaction

about 522, 526

working 526, 527

channel selection algorithm 2 (CSA2) 124

charge-coupled devices (CCD) 64

chirp spread spectrum (CSS) 301

Cisco Meraki

URL 582

Citizen Broadband Radio Service (CBRS) 277, 278, 279

classification

binary or binomial classification 488

multiclass classification 488

Classification and Regression Tree (CART) 494

CLAudit

reference link 447

clear channel assessment (CCA) 171

cloud architectures, IoT

constraints 444

latency effect 445, 447

cloud bursting 436

cloudlet 312

cloudlets 449

CloudPing

reference link 446

cloud services model

about 432, 433

IaaS 434

NaaS 433

PaaS 434

SaaS 434

clusters 181

cluster tree algorithm 183

coarse-grain multithreading 323

coherence bandwidth 104

coherence time 102

cold junction compensation 51

commissioning modes

configuring

establishing

communication theory 88

complementary metal-oxide semiconductor (CMOS) 64

versus charge-coupled devices (CCD) 64

complex instruction set computer (CISC)

about 320

versus reduced instruction set computer (RISC) 320

components, MQTT-SN topology

brokers 412

clients 412

forwarders 412

gateways 412

connected ecosystem

about 34, 36, 37

constant tone extension (CTE) 157

Constrained Application Protocol (CoAP)

about 416

architecture 417, 420

client 419

endpoints 418

messaging formats 420, 421, 423, 424

observer 419

origin server 419

proxies 418, 419

request/response layer 417

server 419

transactional layer 417, 418

usage example 424, 426

Constrained RESTful Environments (CoRE) 416

consumer

about 13

IoT use cases 13

container 353

containerization 353

containers 352, 353

content filtering 392

contention access periods (CAPs) 170

contention free periods (CFPs) 170

continuous integration and continuous delivery (CI/CD) 355

control frame

about 213

acknowledgement frame (ACK) 214

clear to send frame (CTS) 214

request to send frame (RTS) 214

Controller Access Network (CAN) 340

convolutional neural network (CNN) 498

about 498

backpropagation 503, 504, 505, 506, 507

examples 501, 502

forward propagation 503, 504, 505, 506, 508

fully connected layer 502

fundamental deep learning model 499, 500

layer and filters 498

max pooling 499

subsampling 499

training 503, 504, 505, 506, 507

vernacular 503

core architectural blocks, controller level

baseband resource manager 120

BR/EDR PHY (controller block) 120

device manager 120

Host Controller Interface (HCI) 120

link controller 120

link manager 120

core architectural blocks, host level

attribute protocol (ATT) 121

audio 121

channel manager 120

Generic Access Profile (GAP) 121

Generic Attribute Profile (GATT) 121

L2CAP 120

resource manager 120

RFCOMM 121

Security Manager Protocol (SMP) 120

Service Discovery Protocol (SDP) 120

core architecture, 5G

Application Functions (AF) 292

Authentication Credential Repository (ARPF/UDM) 291

Data Network (DN) 292

Policy Control Function (PCF) 292

Security Anchor Function (SEAF) 291

Session Management Function (SMF) 292

User Plane Function (UPF) 292

correlation power analysis (CPA) 527

Counter with CBC-MAC Mode (CCM) 540

cryptographic hash 546, 548

cryptography

about 536

asymmetric cryptography 542

symmetric cryptography 537

cryptography and FIPS standards

reference link 563

current sensors 54, 55

cyber security

about 518

attack and threat terms 518

defense terms 520, 521, 522

cybersecurity

reference link 563

Cybersecurity and Infrastructure Security Agency (CISA) 562

D

DASH7 Alliance

URL 568

data analytics, IoT

alerting 468

batch queries 470

complex event processing (CEP) 479, 480

control 470

databases 469

data lake 478

deep analytics pathway 470

errors 469

joins 469

Lambda architecture 480, 481

models and training 470

preprocessing 468

processing 476, 477, 478

rules engines 473, 474, 475

sector use cases 481, 482, 483

signaling 470

streaming 475, 477, 478

temporal events and patterns 469

top-level cloud pipeline 471, 472

tracking 469

trends 470

windowing 468

data communication 45, 46

data frame 214

Datagram Transport Layer Security (DTLS) 551

Datagram Transport Layer Security (DTLS) 241

data lake 478

DataMonsters

URL

decibel (dB) 89

dedicated short-range communication (DSRC) 219

Defense Information Systems Agency (DISA) 551, 552

defense terms, cyber security

address space layout randomization (ASLR) 520

black hole (sinkhole) 521

Data Execution Prevention (DEP) 521

deep packet inspection (DPI) 521

firewall 521

guard bands and non-executable memory 521

honeypot 521

Instruction-Based Memory Access Control 521

intrusion detection system (IDS) 521

intrusion prevention system (IPS) 521

milkers 521

port scanning 521

private key 522

public key 521

public key infrastructure (PKI) 522

Root of Trust (RoT) 522

secure boot 522

stack canaries 522

trusted execution environment (TEE) 522

delay spread 104

Dell

URL

demilitarized zone (DMZ) 380

device-to-device (D2D) 289

differential phase-shift keying (DPSK) 202

differential power analysis (DPA) 527, 534

differential quaternary phase shift keying (DQPSK) 122

differentiated service code point (DSCP) 377

differentiated services (DiffServ) 377

Diffie-Hellman (ECDH) 136

diffraction 91

Digi

URL 581, 582

digital light processor (DLP) 60

digital signal processor (DSP) 63, 316

digital-to-analog converters (DAC) 204

directed acyclic graph (DAG) 559

direct exchange 428

direct-sequence spread spectrum (DSSS) 171, 200

distance-vector routing 362

distribution PEP 379

double data rate DRAM (DDR) 329

double-spending 557

D-Proxy 379

drive writes per day (DWPD) 334

duplicate address detection (DAD)

about 240

finding neighbors 238

dynamic routing

distance-vector routing 362

link-state routing 362

dynamic routing;about 362

dynamic wear leveling 335

E

east-west traffic 464

Eclipse Foundation

about 576

URL 576

Eddystone-EID 139

Eddystone-TLM 139

Eddystone-UID 139

Eddystone-URL 139

edge computing 46, 47

usage patterns 314

use cases 359, 360

edge hardware

examples 343, 344

edge hardware architectures

about 316

processors 317

edge-level network security

about 372

metrics and analytics 381

QoS 376

security functions 379, 380

traffic shaping 376

virtual LAN (VLAN) 373

VPN 374, 375, 376

edge platforms

about 351

edge processing 449

edge systems

boot 343

coprocessing 342

definition 310

DRAM 329

hardware assist 342

interfaces 331

non-volatile memory 330

operating systems 347

operating systems, selecting 347

purpose 310

storage 330

storage classes 331

use cases 314, 315

volatile memory 329

EdgeX

about 458

architecture 458

goals 458

projects and additional components 459, 460

EdgeX Foundry

about 576

URL 576

EdgeX Virtual Engine (EVE) 460

electric double-layer capacitors (EDLC) 84

Elliptic curve cryptography (ECC) 544

Elliptic-Curve Diffie-Hellman (ECDH) 544

embedded multimedia card (eMMC) 331

Encapsulating Security Payload (ESP) 241

encoding techniques

amplitude-shift keying (ASK) 202

frequency-shift keying (FSK) 202

phase-shift keying (PSK) 202

encryption

cryptographic hash 536

public key encryption 536

symmetric key encryption 536

endianness 321

energy harvesting 74, 75

energy segment

about 17

IoT use cases 17

energy sources 72

energy storage

about 81

batteries 83

radioactive power sources

supercapacitors 84

Enhanced Data Rate Mode (EDR) 115

enhanced mobile broadband (eMBB) 282

enhanced retransmission mode (ERTM) 115

epoch 507

erase cycle 334

error carousel 511

ESPRIT 160

Ethernet Control Model (ECM) 367

Ethernet Emulation Model (EEM) 367

European Commission (EC) 108

European Telecommunications Standards Institute (ETSI) 312

Everything as a Service (XaaS) 432

Evolved Packet System (EPS) 274

Exponential linear unit (ELU) 501

extended discontinuous reception (eDRX) mode 273

Extended Inquiry Response (EIR) 115

Extensible Firmware Interface (EFI) 348

F

fading

fast fading 103

slow fading 103

far-edge component 312

fast Fourier transform (FFT) 205, 512

features, software backplane

node discovery 453

pub/sub management 453

service discovery 453

state management 453

Federal Communications Commission (FCC) 106

field-effect transistor (FET) 56

Field-programmable gate array (FPGAs) 514

Filter Bank Multicarrier (FBMC) 289

fine-grain multithreading 324

fine-grain TDD 295

Fledge 460

floating point units (FPUs) 327

flooding 362

flow-based routing 362

fog and edge consortia

about 575

Eclipse Foundation 576

EdgeX Foundry 576

OpenFog 575

fog computing 312

about 448, 449

Hadoop philosophy 448

versus cloud computing 449

versus edge computing 449

versus mist computing 449

fog nodes 449

fog topologies

about 462, 464, 465

data volume reduction 462

edge devices 462

node capabilities 464

system reliability 464

forward error correction (FEC) 100

forwarders 412

Fowler-Nordheim tunneling effect 334

fragmentation

mesh-under routing fragmentation 238

route-over routing fragmentation 238

frame check sequence (FCS)

free space loss

versus plane earth loss 93

free-space path loss (FSPL) 91

Freewave

URL 582

frequency division multiple access (FDMA) 122

frequency-hopping spread spectrum (FHSS) 121

friend node 149

Friis transmission equation 89, 90

full end devices (FEDs)

fundamentals, for building security foundations

Bitcoin Mining Incentives 558

digitally signed transaction 557

proof-of-work burden 557

security through chaining order 559

security through peer validation 557

unique identification 557

G

GAP layer roles (pre-connection)

central 128

peripheral 128

GATT Layer Roles (post connection)

client 128

server 128

GATT profile

characteristics 133

services 133

GATT profiles, Bluetooth SIG

reference link 134

Gaussian frequency-shift keying (GFSK) 122, 202

Gaussian frequency-shift keying (GFSK) (OSSS)

General-Purpose Computation on Graphics Hardware (GPGPU) 514

general-purpose input/output (GPIO) 340

Generic Attribute Profile 161

Genivi

URL 578

Global System for Mobile Communications (GSM) 247

Google

URL

Google Cloud Platform (GCP) 409

Google IoT Core

reference link 409

governance models and standards 245, 246, 247, 248

governing structure 106, 108

government regulations and intervention 562

about 561, 563

reference links 563

US Congressional Bill 561

gradient 505

gradient descent 505

graphics DDR (GDDR) 329

group messaging 154

guaranteed time slots (GTSs) 170, 180

guard interval (GI) 205

H

Hall effect 54

Hall effect sensors 54, 55

Hall voltage 54

HaLow 224

hardware abstraction layer (HAL) 351

hardware TPM module 343

hardware virtualization 351

healthcare

about 14

IoT use cases 15

hierarchical routing 363

high performance IoT endpoints

about 64

output devices 68

sensor fusion 67, 68

vision systems 64, 65, 66

Hitachi

URL

Home Edge 460

HomeKit

URL 578

host-based firewall 380

host controller interface (HCI) 118

Host Controller Interface (HCI) 120

Host Identity Protocol (HIP) 376

hybrid architectural model 436

hybrid automatic repeat request (HARQ) 295

hybrid cloud 435, 436

hyper-frames (HF) 273

hyperplanes

reference link 490

I

I2C 340

IBM

URL

Identity Resolving Key (IRK) 137

IEEE 802.11

Ad hoc 198

architecture 197, 198, 199

comparing 196

Distribution system (DS) 199

encoding techniques 201, 202, 203, 204, 205, 206

infrastructure 198

interference mitigation techniques 204

MIMO 206, 208, 209, 210

modulation 201, 202, 203, 204, 205, 206

operation 214, 215

packet structure 211, 212, 213

security 216

spectrum allocation 199, 200, 201

suite of protocols 196

IEEE 802.11ac 217, 218

IEEE 802.11ah 224, 226, 227, 228, 229

IEEE 802.11 protocols

and WLAN 195, 196

IEEE 802.11p vehicle-to-vehicle (V2V) 219, 220, 222

IEEE 802.15.4

about 166

address modes 174

architecture 167, 168, 170, 171

full function device (FFD) 171

packet structure 174

reduced function device (RFD) 173

security 175, 176

start-up sequence 174, 175

topology 171, 173

IEEE IoT

about 577

URL 577

if this, then that (IFTTT) 1

image signal processor (ISP) 65

image signal processor pipeline

for color video 65

independent basic set service (IBSS) 198

independent variable 492

indoor positioning systems (IPSs) 156

industrial and commercial, IoT and edge

about 578

cloud providers

commercial and industrial sensor 579

component manufacturers 580

edge computing and solutions companies 582

MEMS manufacturers and vendors 579

microprocessor manufacturers 580

middleware

operating systems

PAN communication companies 581

services companies

silicon manufacturers 580

WAN technology companies 582

industrial and manufacturing

IoT use cases 13

Industrial Internet Consortium

about 577

URL 577

Industrial IoT (IIoT) 12

industrial, scientific and medical (ISM) 108

industrial, scientific, and medical (ISM) 121

Infineon Technologies

URL 579

Inforce Computing

URL

information technology (IT) 194

information theory 94

Infrastructure as a Service (IaaS) 432, 434

infrastructure basic set service (BSS) 198

Ingress Protection 345

initiator 116, 117

instruction-level parallelism (ILP) 322

instruction set architectures (ISA) 319, 320

integrated services (IntServ) 377

Intel

URL 580

Intel Boot Guard 530

interference mitigation techniques, IEEE 802.11

direct-sequence spread spectrum (DSSS) 205

frequency-hopping spread spectrum (FHSS) 205

OFDM 205

International Telecommunication Union (ITU) 106, 245

Internet Engineering Task Force

about 574

URL 574

Internet Engineering Task Force (IETF) 192

Internet Key Exchange (IKE) 375

Internet of Things (IoT) 49

about 1, 11

definition 4, 9, 10

history 4, 5, 6

potential 7, 8, 9

use case 20

Internet Systems Consortium (ISC) 569

intersymbol interference (ISI) 104, 205

Invensense

URL 579

IOPS (input/output per second) 332

Iot

and DAG trust models 560

IoT

Bitcoin (blockchain-based) 555, 556, 557, 559

blockchains 553

cryptocurrencies 553

data analytics 468

example use cases 554

security 48

security best practices

threat 48

versus SCADA 39

IOTA

URL 561

IoT and security entities 578

IoT cyber attacks

anatomy 522

Chain Reaction 522

Mirai 522

Stuxnet 522

IoT data analytics

versus machine learning 515

IoT/Edge solution, components

cloud 36

data analytics 36

edge computing 36

local area networks (LANs) 36

security 37

sensor communication systems 36

sensors, actuators, and physical systems 36

sggregators, routers, gateways 36

IoT security best practices

holistic security

security checklist

IoT transaction

sensing nd power 45

IoT use cases

for agricultural and environmental 17

for consumer 13

for energy 17

for government and military 19

for healthcare 15

for industrial and manufacturing 13

for retail, finance, and marketing 14

for smart city 18

for transportation and logistics 16

IP

features 192, 193

IPSO Alliance (IPSO) 571

IQ-samples 158

J

JSON Web Token (JWT) 409

K

key derivation function (KDF) 536

Key Management Protocol (KMP) 113

key performance indicator (KPI) 21

L

Lambda 460, 461, 462

Lambda architecture

batch layer 480

service layer 481

speed layer 481

Last Will and Testament (LWT) 396

LE2M 144

learning rate 507

least significant bit (LSB) 321

least squares method 492

Lenovo

URL

Light Detection and Ranging (LiDAR) 58

light-out management (LOM) 371

LightWEightM2M (LwM2M) 572

linear classifier 490

linear regression 492

linear time invariant (LTI) 307

link layer roles (pre-connection)

master 128

slave 128

link-state routing 363

listen before talk (LB) 278

lithium-ion (Li-ion) battery 83

logistic regression 490, 493

Long Range (LoRa) 243

long short-term memory (LSTM) 510

Long-Term Evolution (LTE) 248

Long-Term Evolution (LTE) technology 245

long-term key (LTK) 136

look-up table (LUT) 66

LoRa

about 300

physical layer 301, 302

LoRa Alliance

about 574

URL 574

LoRaWAN (Long Range wide area network)

about 300

considerations 306, 307

MAC layer 303, 304

summarizing 306

topology 305

Low Energy (LE) mode 114

Low Energy mode (LE) 115

low-power DDR (LPDDR) 329

low power node (LPN) 149

low-power wide area network (LPWAN) 316

low-power wide-area networks (LPWANs) 270

M

machine learning 47, 48

machine learning, IoT

about 483

AI 484, 485, 486, 487

Bayesian models 495

classification 488

convolutional neural network (CNN) 498

milestones 484, 485, 486, 487

models 487

random forest 494

recurrent neural networks (RNN) 509

regression 492, 493

training and inference 514, 515

machine to machine (M2M) 8

about 37

versus IoT 39

versus SCADA 39

machine-to-machine (M2M) communication 416

majority decisions 495

management frames

association request frame 213

association response frame 213

authentication frame 213

beacon frame 213

deauthentication frame 213

disassociation frame 213

probe request frame 213

probe response frame 213

reassociation frame 213

reassociation response frame 213

management frames

types 213

manifest 357

man-in-the-middle (MITM) attacks 135

MapReduce

map phase 448

reduce phase 448

shuffle step 448

m assive machine-type communications (mMTC) 282

Massive-MIMO (M-MIMO) 286

master 117

maximum coupling loss (MCL) 102, 276

maximum transmission unit (MTU) 236

mean opinion score (MOS) 377

Media Access Control (MAC) 195

media access layer (MAC) 169

Medium Access Control (MAC)

memory hierarchy 325

memory types

comparing 329, 330

MEMS accelerometers 60, 61, 62

MEMS gyroscopes 60, 61, 62

MEMS microphones 62

MEMS pressure sensors 63

MEMS sensors 59

mesh link establishment (MLE)

message authentication codes (MAC) 536

message-orientated middleware (MOM) 388

message passing interfaces (MPI) 322

Message Queue Telemetry Transport (MQTT)

about 390, 391

architecture 396, 397, 398

communication formats 404, 406, 407

data types 402, 403, 404

packet structure 400, 401, 402

publish-subscribe 391, 392, 394, 395

state transitions 399

URL 390

working example 409, 410, 411

messaging formats, CoAP

Acknowledgement (ACK) 420

Confirmable (CON) 420, 421

Non-confirmable (NON) 420

Reset (RST) 420

messaging patterns, using in AMQP

asynchronous directed messages 430

request/reply or pub/sub 430

store and forward 430

Microchip

URL 579, 581

Microchip Technologies

URL 581

Microelectromechanical systems (MEMS) 59

Microsoft

URL

Microsoft Azure IOT Edge

about 355

architecture 356, 357, 358, 359

requisites 356

military and government

about 19

IoT use cases 19

minimal end devices (MEDs)

Mirai

about 522, 523

working, scenarios 523

mist computing 449

mobile edge computing 312

Mobile wireless service (MWS) 116

ModBus

URL 568

models, SSP

Just WorksTM 135

numeric comparison 135

out-of-band (OOB) 135

passkey entry 135

more data (MD) flag 149

most significant bit (MSB) 321

MQTT

versus MQTT-SN 414, 415

MQTT 3.1.1

reference link 407

MQTT 5

reference link 407

MQTT broker

selecting 415

MQTT communication formats

cleanSession 405

cleanStart 405

clientID 405

keepAlive 405

lastWillMessage 405

lastWillQos 405

lastWillRetain 405

lastWillTopic 405

password 405

Username 405

MQTT-SN

about 412

architecture and topology 412

multefire 277, 278, 279

multi-access edge computing (MEC) 291

multiaccess edge computing (MEC) 312

Multicast Protocol for Low-Power and Lossy Networks (MPL)

multicast routing 363

multihoming 229

multilevel cells (MLC) 335

multipath fading 208

multipath transmission 206

multiple input, multiple output (MIMO) 96

multiple-input multiple-output (MIMO)

about 206

spatial diversity 208

spatial multiplexing 208

multiprocessing 324

MUSIC 160

N

NAND flash memory

considerations 334

design 334

NaN (not a number error) 510

narrowband 102

National Institute for Standards and Technology (NIST) 563

National Institute of Standards and Technology

about 578

URL 578

National Security Telecommunications Advisory Committee

about 578

URL 578

National Telecommunications and Information Administration

about 578

URL 578

National Telecommunications and Information Administration (NTIA) 106

near-edge component 311

negative acknowledgement return codes 402

neighbor discovery (ND) 240, 241

about 238

Network Discovery (ND) phase 231

network firewall 380

network function virtualization (NFV) 297, 382

Networking as a Service (NaaS) 432

network layer (NWK) 180

nodes 555

nodes, 6LoWPAN mesh

edge routers 231

host nodes 231

router nodes 231

Non-orthogonal multiple access (NOMA) 289

non-standalone (NSA) 282

nonsymmetric protocol 396

non-volatile memory (NVMe) 331

Nordic Semiconductor

URL 581

north-south traffic 464

Nvidia

URL 581

NXP

URL 581

NXP Semiconductors

URL 579

O

Object Management Group (OMG)

about 570, 571

URL 570

Office of Management and Budget (OMB) 562

OMA Specworks

about 571, 572

URL 571

Omron

URL 580

on-board unit (OBU) 219

oneM2M

about 572

URL 572

Online Trust Alliance (OTA)

about 572

URL 572

onSemi

URL 580

On Semiconductor

URL 581

Open Automotive Alliance

URL 578

Open Connectivity Foundation

about 569

URL 569

OpenFog

about 576

URL 576

OpenFog Reference Architecture

about 450

accelerators 454

actuators 457

application services 451

application support 452, 453

compute 456

control systems 457

hardware platform infrastructure 457

hardware virtualization 453

network 454

network, component requirements 454

node management 453

node security 454

protocol abstraction 457

sensors 457

software backplane 453

stotage 456

Open Interconnect Foundation 569

Open Mobile Alliance (OMA) 571

Open Shortest Path First (OSPF) 364

Open Source Interconnection (OSI) model 194

OpenStack cloud architecture

about 436, 437

Ceilometer 444

Cinder 442

Glance 438

Heat 443

Horizon 443

keystone 438

neutron 442

Nova 438, 440, 441

Swift 442

operating system tuning 350

operational technology (OT) 194

operation modes

CBC with Message Authentication Code (CBC-MAC) 540

cipher block chaining (CBC) 538

cipher feedback (CFB) chaining 540

Counter (CTR) 540

Electronic Codebook (ECB) 538

Output Feedback (OFB) Chaining 540

Organizationally Unique Identifier (OUI) 124

organizational unique identifier (OUI) 183

Organization for the Advancement of Structured Information Standards (OASIS)

about 570

URL 570

orphaning 184

orthogonal frequency-division multiplexing (OFDM) 200, 299

Orthogonal Sequence Spread Spectrum (OSSS)

out-of-band management (OOBM 371

output devices 68

Over-the-Air-Activation (OTAA) 304

over-the-air (OTA) 526

P

packet firewall 380

PAN consortia

about 566

Bluetooth 566

miscellaneous 568

Thread Group 566

Zigbee Alliance 568

PAN-to-WAN bridging

about 366, 367, 368, 369

cached action 367

ignored action 366

transmitted action 367

PCI Express (PCIe) 341

peak-to-average power ratio (PAPR) 299

Peer Aware Communications (PAC) 113

Peplink

URL 582

perceptrons 484

performance-enhancing proxies (PEPs) 379

periodic advertising sync transfer (PAST) 165

Periodic Restricted Access Windows (PRAW) 228

personal area networks (PANs) 46

personal identification number (PIN) 135

photoelectric sensors 55, 56

physical and hardware security

about 528

key management and trusted platform modules 530, 531

processor and memory space 531

Root of Trust (RoT) 528, 530

storage security 531

physical security

about 532

attack types 534

piconet 117

piezo-mechanical 77

piezo-mechanical harvesting 77

plane earth loss

versus free space loss 93

plane earth loss formula 91

Platform as a Service (PaaS) 432, 434

point of interest (POI) 137

point-of-sale (POS) 373

port forwarding 380

power efficiency 97

Power Limited region 98

power-line controller (PLC) 195

power management 72, 73, 74

power-on self-test (POST) 348

Power Save Mode (PSM) 271

power-saving states, STA

non-TIM stations 228

traffic indication map (TIM) 228

unscheduled stations 228

power sources

preamble structures

802.11 a/g 211

802.11 b 211

802.11n 211

private cloud 435

processors

about 317

caches 325

characteristics 327

endianness 321, 322

instruction set architectures (ISA) 319, 320

memory hierarchy 326

parallelism 322, 323, 324

power 318

registers 319

speed 318

program-erase (PE) 336

programmable logic controllers (PLC) 525

programmable logic controllers (PLCs) 39, 310

proof-of-work (PoW) 557

Protocol consortia

about 569

Allseen Alliance 569

miscellaneous 572

OASIS 569, 570

Object Management Group (OMG) 570, 571

OMA Specworks 571, 572

Open Connectivity Foundation 569

protocols

about 387, 388, 389

comparisons

provisioning

about 154

proxy PEP 379

pseudocapacitors 84

pseudo-noise (PN) 205

pseudo-random number generator (PRNG) 544

public cloud 435, 436

public key infrastructure (PKI) 548

publisher 392

publish-subscribe (pub/sub) 391

pulse density modulated (PDM) 63

PV6 over Low-Power Wireless Personal Area Networks (6LoWPAN) 195

pyroelectric infrared (PIR) sensors 56, 57

Q

QoS functions 376

quad-level cells (QLC) 335

quadrature amplitude modulation (QAM) 203

Qualcomm

URL 581

quality of service levels, MQTT

QoS-0 (non-assured transmission) 398

QoS-1 (assured transmission) 398

QoS-2 (assured service on applications) 398

quality of services (QoS) 376

R

radio access network (RAN) 312

radioactive power sources

Radiocommunication Sector (ITU-R) 245

radiofrequency (RF) energy harvesting 78

radio spectrum 105

random frequency and time-division multiple access (RFTDMA)

Realizable Region 98

real-time locating systems (RTLSs) 156

Received Signal Strength Indicator (RSSI) 115

Rectified linear unit (ReLU) 501

recurrent neural networks (RNNs) 485, 509, 510, 511, 512, 513

reduced instruction set computer (RISC)

about 320

versus complex instruction set computer (CISC) 320

reflections 91

registers 319

registration authority (RA) 548

regression

about 492

techniques 492

regression line 492

relay node 149

Remote Network Driver Interface Specification (RNDIS) 367

remote radio head (RRH) 291

resistance temperature detectors (RTDs) 52, 53

Restricted Access Window (RAW) 227

retail, finance, and marketing

about 14

IoT use cases 14

retained message 392

RF energy 89

RF interference 93

RIPng (RIP next generation) 364

Rivest-Shamir-Adleman algorithm (RSA) 542

road-side unit (RSU) 219

Robust Caching 162

roles, Thread architecture

border router

end devices

lead device

REEDs

sleepy end devices

Thread routers

Root of Trust (RoT)

starting methods 528

round trip time (RTT) 295

round-trip times (RTT) 447

Router-Eligible End Devices (REED)

Routing Information Protocol (RIP) 363, 364

routing paths

destination 365

device UID 365

flags 365

gateway 365

metric 365

types 366

routing schemes, 6LoWPAN mesh networks

mesh-under network 233

route-over network 233

RPL protocol

non-storing mode 235

storing mode 235

rule patterns

semantic 475

syntactic 475

RUMBLE IoT

URL

S

SaaS (software as a service) 355

SCADA (supervisory control and data acquisition) 37

scan mechanisms

active scanning 214

passive scanning 214

scanner 116

scattering 91, 92

scatternet 117

sectors 224

secure shell (SSH) 535

secure simple pairing (SSP) 135

Secure Simple Pairing (SSP) 115

seebeck electromotive effect 50

Semtech

URL 582

sensing devices

about 50

sensor fusion 67, 68

sensor fusion, modes

centralized 67

decentralized 67

serializer/deserializer (SerDes) 341

Serial Peripheral Interface (SPI) 339

Service Access Points (SAP) 169

Service Change Indication feature 161

service-level agreement (SLA) 243

Shannon-Hartley theorem 95, 96, 97, 98, 99

Shannon limit 97

shared spectrum cellular 277

Shared Subscriptions 394

shell security

about 535, 536

shortest path routing 362

Siddhi package 480

Sierra Wireless

URL 582

Sigfox

about 307

MAC layer

physical layer

protocol stack

topology

traits 307

Sigfox protocol stack

frame layer

MAC layer

PHY layer

sigmoid function 493

signal-to-noise ratio (SNR) 96, 204

Silicon Labs

URL 581

Simple (Streaming) Text Message-Oriented Middleware Protocol (STOMP) 427

single-instruction multiple-data (SIMD) 328

single-level cells (SLC) 335

slave 117

Sleep Clock Accuracy (SCA) 166

Slot availability masks (SAM) 116

Slot Availability Masks (SAMs) 124

smart city

about 18

deployment, characteristics 18

IoT use cases 18

SmokePing

reference link 447

snooping 379

SOCs

high-speed IO 341

low-speed IO 339, 341

Software as a Service (SaaS) 432, 434

software-defined networking (SDN) 297, 433, 570

about 376, 381

architecture 382, 383, 385

benefits

traditional internetworking 385

Software-Defined Perimeter

about 551

architecture 551

software-defined perimeters (SDP) 433

Software-Defined Perimeters (SDPs)

software-defined wide-area network (SDWAN) 311

solar harvesting 75, 76, 77

solutions, for scheduling URLCC packet

instant scheduling 296

reservation-based scheduling 296

space-division multiple access (SDMA) 217

sparse code multiple access (SCMA) 289

spatial division multiplexing (SDM) 217

spatial streams 208

Spectrum Resource Utilization (SRU) 113

split TCP 379

SSID

SSL (Secure Sockets Layer) 549

standalone (SA) 282

stateful firewall 380

stateful state 473

static routing 362

static wear leveling 336

ST Microelectronics

URL 580, 581

storage devices

cons 332

pros 332

Stuxnet

about 522, 525

working 525

subject filtering 392

Submitting Memberships 570

subscriber 392

subscriber concealed identifier (SUCI) 293

subscriber permanent identifiers (SUPI) 293

subscription group 394

subspace algorithms 160

supercapacitors 84

supercapacitors, forms

electric double-layer capacitors (EDLC) 84

pseudocapacitors 84

SuperFrame interval (SO) 170

superscalar 323

supervised learning 487

supervisory control and data acquisition (SCADA) 12

SWOT (strengths, weaknesses, opportunities, and threats) 4

symmetric cryptography 537, 538, 540, 541

symmetric multithreading 324

synthetic sensing

system on chip (SOC) 26, 316

T

tangle 560

Target Beacon Transmit Time (TBTT) 214

Target Wake Time (TWT) 229

TCP/IP network functions, edge

about 362

failover and out-of-band management 371, 372

PAN-to-WAN bridging 366, 367, 368, 369, 370

routing functions 362, 363, 364, 365

TCP/IP (transmission control protocol/internet protocol) 192, 193, 194

Technical Advisory Councils (TAC) 576

techniques, for mitigating PAPR effects

clipping 299

non-orthogonal multiple access 300

PTS 299

SLM 299

TE Connectivity

URL 580

telemedicine palliative care

about 20

cloud layer 22

edge layer, architecture 26, 27

far edge layer 22

far edge layer, architecture 24, 25

feature set and service requirements 21

implementation 22, 23

near-edge PAN-WAN layer 22

software architecture 28, 29, 30, 31

summarizing 31, 32

Telit

URL 582

temperature sensor

about 50

benefits 54

use case 54

Temporal Key Integrity Protocol (TKIP) 216

TensorFlow

reference link 501

TensorFlow Playground 502

Texas Instruments

URL 580, 581

Texas Instruments CC2650 SensorTag 69, 70, 71

Texas Instruments infrared thermopile sensor (TMP007) 71

theoretical range 89

thermal harvesting 78, 79

thermionic 78

thermistors 53

thermocouples (TC) 50, 51

thermoelectric 78

thermoelectric generator (TEG) 78

thread

architecture and topology

Thread

about 241

addressing

architecture and topology

neighbor discovery

protocol stack

routing

Thread Group

about 566

reference link 566

thread-level parallelism (TLP) 323

time diversity 103

time division duplexing (TDD) 122

time-division multiple access (TDMA) 122

time-of-flight (ToF) 59

time-to-live (TTL) 151

TLS encryption

process 549, 550

Topic Aliases 395

Topic Alias Maximum 396

topic exchange 428

Tracking Area Update (TAU) 271

traffic shaping functions 377

train nudging 123

transaction fee 558

Transmission Time Interval (TTI) 296

transparent gateway 413

transportation and logistics

about 15

IoT use cases 16

Transport Layer Security 549

Transport Layer Security (TLS) 241

trapdoor function 542

triple-level cells (TLC) 335

trusted execution environment (TEE) 530

Trusted Platform Modules (TPMs) 343

Trusted Platform Module (TPM) 332, 530

type filtering 392

typical Unix boot process 348

U

Ublox

URL 582

ultra-narrowband (UNB)

ultra-reliable and low-latency communications (URLLC) 282

umbrella organizations

about 576

IEEE IoT 577

Industrial Internet Consortium 576

miscellaneous 578

unified authentication framework 293

uniform linear array (ULA) 157

uniform rectangular array (URA) 157

uninterruptible power supply (UPS) 27

universal asynchronous receiver/transmitter (UART) 340

Universal Datagram Protocol (UDP) 193

Universal Plug and Play (UPnP) 569

universal resource identifier (URI) 388

universal resource locator (URL) 389

unsupervised learning 487

US-CERT

about 578

reference link 578

use cases, MQTT

QoS-0 398

QoS-1 398

QoS-2 398

user plane functions (UPF) 292

User Properties 400, 401

V

validation authority (VA) 548

vanishing gradient problem 506

vehicular ad hoc networks (VANET) 219

virtualization

about 351

hardware virtualization 351

para-virtualization 351

virtual LAN (VLAN) 373, 374

virtual machine (VM) 353

vision systems 64, 65, 67

Voice over Internet Protocol (VOIP) 377

volatile memory 329

von-Neumann architecture 316

VPN

about 374, 376

Generic Routing Encapsulation (GRE) 375

Internet Protocol Security (IPsec) VPN 374

Layer 2 Tunneling Protocol (L2TP 375

OpenVPN 374

WireGuard 374

W

WAN consortia

about 572

Internet Engineering Task Force 574

LoRa Alliance 574

Weightless SIG 572

Wi-Fi Alliance 575

Weightless SIG

about 572

URL 572

wide area network (WAN) 243

wideband 102

Wi-Fi Alliance

about 575

URL 575

Wi-Fi Protected Access (WPA) 196

wired equivalent privacy (WEP) 216

wireless body area network (WBAN) 87

wireless field area network (FAN) 87

wireless home area network (HAN) 87

wireless LAN (WLAN) 191

Wireless Life Sciences Alliance

URL 578

wireless local area network (WLAN) 87

wireless neighborhood area network (NAN) 87

wireless personal area networks (WPANs) 243

World Radio Conference (WRC) 282

WPA2 216

WPA pre-shared key (WPA-PSK) 216

Y

year over year (YoY) 22

Z

Zigbee

about 177

addressing 182

association 184

history 177

link key 185

MAC 180

master key 185

mesh routing 183

network key 185

overview 178

packet structure 182

PHY 180

protocol stack 180, 182

security 184

Zigbee Alliance

about 568

URL 568

Zigbee, controllers

bridge controller 188

installer controller 188

status update controller 188

SUC ID server (SIS) 188

Zigbee controller (ZC) 178

Zigbee coordinator (ZC) 184

Zigbee device object (ZDO) 180

Zigbee end devices (ZED) 184

Zigbee end device (ZED) 178

Zigbee Light Link (ZLL) 526

Zigbee, packet routing methods

broadcasting 183

mesh routing (table routing) 183

source routing 183

tree routing 183

Zigbee router (ZR) 178

Zigbee security model

application layer 185

network layer 185

Zigbee, slaves

enhanced slave 188

routing slave 188

Zigbee, topologies

cluster tree 179

mesh network 179

star network 179

Z-Wave

about 186

addressing

controller device 187

overview 187

routing

slave device/node 188

topology

Z-Wave Alliance

URL 568

Z-Wave protocol stack

about 189

application layer 189

MAC layer 189

PHY layer 189

routing layer 189

transfer layer 189

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.218.184