Symbols
3GPP user equipment categories 251, 252
4G LTE
Cat-M1 270
E-UTRAN protocol stack 264, 265, 266
geographical areas 266, 267, 269
handover procedures 266, 267, 269
NB-IoT 270
packet structure 270
spectrum allocation and bands 252, 254, 256, 257, 258, 259
topology and architecture 259, 260, 261, 262, 263, 264
5G
energy considerations 298, 299, 300
fine-grain time-division duplexing (TDD) 295, 296
frequency distribution 284, 285, 286, 288, 289
network slicing 297
RAN architecture 289, 290, 291
reference link 280
security and registration 293
Ultra-Reliable Low-Latency Communications (URLCC) 294, 295
6LoWPAN
functions 230
header compression and fragmentation 236, 237, 238
mesh addressing and routing 233, 235
node types 231
protocol stack 232
security 241
topology 229
8-phase differential phase-shift keying (8DPSK) 122
24-bit ADC 71
802.11ah network
relay node 228
root access point 227
STA 227
A
access control list (ACL) 175
access control lists (ACL) 184
access point (AP) 198
ACK filtering 379
Activation by Personalization (ABP) 304
active sensing systems 58
Adaptive Data Rate (ADR) 302
Adaptive frequency hopping (AFH) 122
Adaptive frequency hopping spread spectrum (AFH) 115
additive white Gaussian noise (AWGN) 97
address space layout randomization (ASLR) 531
Ad Hoc On-Demand Distance Vector (AODV) 148, 183
Advanced Encryption Standard (AES) , 342, 537
Advanced Message Queuing Protocol (AMQP)
URL 428
Advanced Vector Extensions (AVX) 328
Advantech
URL
AdvDataInfo (ADI) 166
advertiser 116
AES Counter Mode (AES-CTR) 540
aggregating gateway
about 413
advertisement 414
discovery 414
agricultural and environment
about 16
IoT use cases 17
Akraino Edge Stack 459
Allseen Alliance 569
Amazon
URL
ambient computing 359
AMD
URL 580
AMP-specific stack
AMP MAC 121
AMP manager 121
AMP PAL 121
AMP (PHY) 121
Analog Devices
URL 579
analog-to-digital converters (ADC) 204
angle of arrival (AoA) 156
angle of departure (AoD) 156
application binary interface (ABI) 347
application objects 181
approval 560
architectural board (AB) 570
arithmetic logic unit (ALU) 322
ARM
URL 580
ARM AArch64 Neon SIMD instructions
examining 328
ARM TrustZone 530
association 184
association identifier (AID) assignment 226
asymmetric cryptography 542, 544, 546
asymmetric protocol 396
attack and threat termscyber security
amplification attack 518
ARP spoof 518
banner scans 518
botnets 518
brute force 518
buffer overflow 518
C2 518
correlation power analysis attack 518
dictionary attack 519
distributed denial-of-service (DDoS) 519
fuzzing 519
man-in-the-middle attack (MITM) 519
NOP sleds 519
RCE exploit 519
replay attack 519
return-oriented programming (ROP) attack 519
return-to-libc 520
rootkit 520
side-channel attack 520
social engineering 520
spoofing 520
SQL injection 520
SYN flood 520
XSS (cross-site scripting) 520
zero-day exploits 520
Authentication Handler (AH) 241
Authentication Initiation Request (5G-AIR) 293
autonomous 37
B
BACnet
URL 568
Baetyl 459
Bandwidth Limited region 98
baseband unit (BBU) 291
Basic Rate / Enhanced Data Rate (BR/EDR) mode 117
batch 507
batch processing 477
batteries 83
beacon interval (BO) 170
beamforming methods, IEEE 802.11
explicit feedback beamforming 210
implicit feedback beamforming 210
best-effort delivery 193
bidirectional transport (BDT) 227
binary frequency-shift keying (BPSK) 202
binding 428
Bitcoin mining 555
bit error rate (BER) 99, 100, 101, 204
bitrate limits 95
BLE roles
about 128
GAP layer roles (pre-connection) 128
GATT Layer Roles (post connection 128
link layer roles (pre-connection) 128
BLE security 136
Bluetooth
BLE roles 128
packet structure 124
profiles 133
URL 566
Bluetooth 1.0 and 1.0B 115
Bluetooth 1.1 115
Bluetooth 1.2 115
Bluetooth 2.0 115
Bluetooth 2.1 115
Bluetooth 3.0 115
Bluetooth 4.0 115
Bluetooth 4.1 116
Bluetooth 4.2 116
Bluetooth 5
communication process 116, 117
range and speed enhancement 143, 144, 145
stack 118
Bluetooth 5.0 116
Bluetooth 5.1 116
about 155
direction finding 156, 157, 158, 159, 160
periodic advertising sync transfer 163, 165
randomized advertising channel indexing 162
Bluetooth beaconing 137, 138, 139, 140, 141, 142, 143
Bluetooth events, transpiring in Bluetooth WPAN
advertising 116
connecting 116
extended advertising 117
periodic advertising 117
Bluetooth Low Energy (BLE) 93, 114, 444
summarizing 25
Bluetooth Low Energy (BLE) mode
Bluetooth mesh
about 145
layers 146
provisioning 154
Bluetooth mesh, addressing modes
about 151
group addressing 152
unicast addressing 151
virtual addressing 152
Bluetooth mesh, entities 149
elements 149
mesh gateway 149
nodes 149
unprovisioned devices 149
Bluetooth, operation modes
Alternative MAC/PHY (AMP) 119
Basic Rate/Enhanced Data Rate mode (BR/EDR) 119
Low Energy (LE) mode 119
Bluetooth SIG
URL 114
Bluetooth stack
elements 118
profiles 118
protocols 118
board support package (BSP) 347
bootstrap aggregating (bagging) 494
Border Gateway Protocol (BGP) 363
border router 230
Bosch
URL 579
BR/EDR mode
authentication 135
encryption 136
BR/EDR security 135
broadcast routing 363
Broadcom
URL 579
business rule management systems (BRMSs) 473
C
caches 325
carrier sense multiple access with collision avoidance (CSMA/CA) 168
Cat-NB
CCA mode 1 171
CCA mode 2 171
CCA mode 3 171
CCA mode 4 171
CCA Mode 5 171
cell array 337
cellular access technologies
about 249
code-division multiple access (CDMA) 249
frequency-division multiple access (FDMA 249
time-division multiple access (TDMA) 249
cellular connectivity
about 244
Cellular Internet of Things (CIoT) 274
central unit (CU) 291
certificate authorities (CA) 548
chaining method 473
Chain Reaction
channel selection algorithm 2 (CSA2) 124
charge-coupled devices (CCD) 64
chirp spread spectrum (CSS) 301
Cisco Meraki
URL 582
Citizen Broadband Radio Service (CBRS) 277, 278, 279
classification
binary or binomial classification 488
multiclass classification 488
Classification and Regression Tree (CART) 494
CLAudit
reference link 447
clear channel assessment (CCA) 171
cloud architectures, IoT
constraints 444
cloud bursting 436
cloudlet 312
cloudlets 449
CloudPing
reference link 446
cloud services model
IaaS 434
NaaS 433
PaaS 434
SaaS 434
clusters 181
cluster tree algorithm 183
coarse-grain multithreading 323
coherence bandwidth 104
coherence time 102
cold junction compensation 51
commissioning modes
configuring
establishing
communication theory 88
complementary metal-oxide semiconductor (CMOS) 64
versus charge-coupled devices (CCD) 64
complex instruction set computer (CISC)
about 320
versus reduced instruction set computer (RISC) 320
components, MQTT-SN topology
brokers 412
clients 412
forwarders 412
gateways 412
connected ecosystem
constant tone extension (CTE) 157
Constrained Application Protocol (CoAP)
about 416
client 419
endpoints 418
messaging formats 420, 421, 423, 424
observer 419
origin server 419
request/response layer 417
server 419
Constrained RESTful Environments (CoRE) 416
consumer
about 13
IoT use cases 13
container 353
containerization 353
content filtering 392
contention access periods (CAPs) 170
contention free periods (CFPs) 170
continuous integration and continuous delivery (CI/CD) 355
control frame
about 213
acknowledgement frame (ACK) 214
clear to send frame (CTS) 214
request to send frame (RTS) 214
Controller Access Network (CAN) 340
convolutional neural network (CNN) 498
about 498
backpropagation 503, 504, 505, 506, 507
forward propagation 503, 504, 505, 506, 508
fully connected layer 502
fundamental deep learning model 499, 500
layer and filters 498
max pooling 499
subsampling 499
training 503, 504, 505, 506, 507
vernacular 503
core architectural blocks, controller level
baseband resource manager 120
BR/EDR PHY (controller block) 120
device manager 120
Host Controller Interface (HCI) 120
link controller 120
link manager 120
core architectural blocks, host level
attribute protocol (ATT) 121
audio 121
channel manager 120
Generic Access Profile (GAP) 121
Generic Attribute Profile (GATT) 121
L2CAP 120
resource manager 120
RFCOMM 121
Security Manager Protocol (SMP) 120
Service Discovery Protocol (SDP) 120
core architecture, 5G
Application Functions (AF) 292
Authentication Credential Repository (ARPF/UDM) 291
Data Network (DN) 292
Policy Control Function (PCF) 292
Security Anchor Function (SEAF) 291
Session Management Function (SMF) 292
User Plane Function (UPF) 292
correlation power analysis (CPA) 527
Counter with CBC-MAC Mode (CCM) 540
cryptography
about 536
asymmetric cryptography 542
symmetric cryptography 537
cryptography and FIPS standards
reference link 563
cyber security
about 518
attack and threat terms 518
cybersecurity
reference link 563
Cybersecurity and Infrastructure Security Agency (CISA) 562
D
DASH7 Alliance
URL 568
data analytics, IoT
alerting 468
batch queries 470
complex event processing (CEP) 479, 480
control 470
databases 469
data lake 478
deep analytics pathway 470
errors 469
joins 469
models and training 470
preprocessing 468
sector use cases 481, 482, 483
signaling 470
temporal events and patterns 469
top-level cloud pipeline 471, 472
tracking 469
trends 470
windowing 468
data frame 214
Datagram Transport Layer Security (DTLS) 551
Datagram Transport Layer Security (DTLS) 241
data lake 478
DataMonsters
URL
decibel (dB) 89
dedicated short-range communication (DSRC) 219
Defense Information Systems Agency (DISA) 551, 552
defense terms, cyber security
address space layout randomization (ASLR) 520
black hole (sinkhole) 521
Data Execution Prevention (DEP) 521
deep packet inspection (DPI) 521
firewall 521
guard bands and non-executable memory 521
honeypot 521
Instruction-Based Memory Access Control 521
intrusion detection system (IDS) 521
intrusion prevention system (IPS) 521
milkers 521
port scanning 521
private key 522
public key 521
public key infrastructure (PKI) 522
Root of Trust (RoT) 522
secure boot 522
stack canaries 522
trusted execution environment (TEE) 522
delay spread 104
Dell
URL
demilitarized zone (DMZ) 380
device-to-device (D2D) 289
differential phase-shift keying (DPSK) 202
differential power analysis (DPA) 527, 534
differential quaternary phase shift keying (DQPSK) 122
differentiated service code point (DSCP) 377
differentiated services (DiffServ) 377
Diffie-Hellman (ECDH) 136
diffraction 91
Digi
digital light processor (DLP) 60
digital signal processor (DSP) 63, 316
digital-to-analog converters (DAC) 204
directed acyclic graph (DAG) 559
direct exchange 428
direct-sequence spread spectrum (DSSS) 171, 200
distance-vector routing 362
distribution PEP 379
double data rate DRAM (DDR) 329
double-spending 557
D-Proxy 379
drive writes per day (DWPD) 334
duplicate address detection (DAD)
about 240
finding neighbors 238
dynamic routing
distance-vector routing 362
link-state routing 362
dynamic routing;about 362
dynamic wear leveling 335
E
east-west traffic 464
Eclipse Foundation
about 576
URL 576
Eddystone-EID 139
Eddystone-TLM 139
Eddystone-UID 139
Eddystone-URL 139
usage patterns 314
edge hardware
edge hardware architectures
about 316
processors 317
edge-level network security
about 372
metrics and analytics 381
QoS 376
traffic shaping 376
virtual LAN (VLAN) 373
edge platforms
about 351
edge processing 449
edge systems
boot 343
coprocessing 342
definition 310
DRAM 329
hardware assist 342
interfaces 331
non-volatile memory 330
operating systems 347
operating systems, selecting 347
purpose 310
storage 330
storage classes 331
volatile memory 329
EdgeX
about 458
architecture 458
goals 458
projects and additional components 459, 460
EdgeX Foundry
about 576
URL 576
EdgeX Virtual Engine (EVE) 460
electric double-layer capacitors (EDLC) 84
Elliptic curve cryptography (ECC) 544
Elliptic-Curve Diffie-Hellman (ECDH) 544
embedded multimedia card (eMMC) 331
Encapsulating Security Payload (ESP) 241
encoding techniques
amplitude-shift keying (ASK) 202
frequency-shift keying (FSK) 202
phase-shift keying (PSK) 202
encryption
cryptographic hash 536
public key encryption 536
symmetric key encryption 536
endianness 321
energy segment
about 17
IoT use cases 17
energy sources 72
energy storage
about 81
batteries 83
radioactive power sources
supercapacitors 84
Enhanced Data Rate Mode (EDR) 115
enhanced mobile broadband (eMBB) 282
enhanced retransmission mode (ERTM) 115
epoch 507
erase cycle 334
error carousel 511
ESPRIT 160
Ethernet Control Model (ECM) 367
Ethernet Emulation Model (EEM) 367
European Commission (EC) 108
European Telecommunications Standards Institute (ETSI) 312
Everything as a Service (XaaS) 432
Evolved Packet System (EPS) 274
Exponential linear unit (ELU) 501
extended discontinuous reception (eDRX) mode 273
Extended Inquiry Response (EIR) 115
Extensible Firmware Interface (EFI) 348
F
fading
fast fading 103
slow fading 103
far-edge component 312
fast Fourier transform (FFT) 205, 512
features, software backplane
node discovery 453
pub/sub management 453
service discovery 453
state management 453
Federal Communications Commission (FCC) 106
field-effect transistor (FET) 56
Field-programmable gate array (FPGAs) 514
Filter Bank Multicarrier (FBMC) 289
fine-grain multithreading 324
fine-grain TDD 295
Fledge 460
floating point units (FPUs) 327
flooding 362
flow-based routing 362
fog and edge consortia
about 575
Eclipse Foundation 576
EdgeX Foundry 576
OpenFog 575
fog computing 312
Hadoop philosophy 448
versus cloud computing 449
versus edge computing 449
versus mist computing 449
fog nodes 449
fog topologies
data volume reduction 462
edge devices 462
node capabilities 464
system reliability 464
forward error correction (FEC) 100
forwarders 412
Fowler-Nordheim tunneling effect 334
fragmentation
mesh-under routing fragmentation 238
route-over routing fragmentation 238
frame check sequence (FCS)
free space loss
versus plane earth loss 93
free-space path loss (FSPL) 91
Freewave
URL 582
frequency division multiple access (FDMA) 122
frequency-hopping spread spectrum (FHSS) 121
friend node 149
Friis transmission equation 89, 90
full end devices (FEDs)
fundamentals, for building security foundations
Bitcoin Mining Incentives 558
digitally signed transaction 557
proof-of-work burden 557
security through chaining order 559
security through peer validation 557
unique identification 557
G
GAP layer roles (pre-connection)
central 128
peripheral 128
GATT Layer Roles (post connection)
client 128
server 128
GATT profile
characteristics 133
services 133
GATT profiles, Bluetooth SIG
reference link 134
Gaussian frequency-shift keying (GFSK) 122, 202
Gaussian frequency-shift keying (GFSK) (OSSS)
General-Purpose Computation on Graphics Hardware (GPGPU) 514
general-purpose input/output (GPIO) 340
Generic Attribute Profile 161
Genivi
URL 578
Global System for Mobile Communications (GSM) 247
URL
Google Cloud Platform (GCP) 409
Google IoT Core
reference link 409
governance models and standards 245, 246, 247, 248
government regulations and intervention 562
reference links 563
US Congressional Bill 561
gradient 505
gradient descent 505
graphics DDR (GDDR) 329
group messaging 154
guaranteed time slots (GTSs) 170, 180
guard interval (GI) 205
H
Hall effect 54
Hall voltage 54
HaLow 224
hardware abstraction layer (HAL) 351
hardware TPM module 343
hardware virtualization 351
healthcare
about 14
IoT use cases 15
hierarchical routing 363
high performance IoT endpoints
about 64
output devices 68
Hitachi
URL
Home Edge 460
HomeKit
URL 578
host-based firewall 380
host controller interface (HCI) 118
Host Controller Interface (HCI) 120
Host Identity Protocol (HIP) 376
hybrid architectural model 436
hybrid automatic repeat request (HARQ) 295
hyper-frames (HF) 273
hyperplanes
reference link 490
I
I2C 340
IBM
URL
Identity Resolving Key (IRK) 137
IEEE 802.11
Ad hoc 198
comparing 196
Distribution system (DS) 199
encoding techniques 201, 202, 203, 204, 205, 206
infrastructure 198
interference mitigation techniques 204
modulation 201, 202, 203, 204, 205, 206
packet structure 211, 212, 213
security 216
spectrum allocation 199, 200, 201
suite of protocols 196
IEEE 802.11ah 224, 226, 227, 228, 229
IEEE 802.11 protocols
IEEE 802.11p vehicle-to-vehicle (V2V) 219, 220, 222
IEEE 802.15.4
about 166
address modes 174
architecture 167, 168, 170, 171
full function device (FFD) 171
packet structure 174
reduced function device (RFD) 173
IEEE IoT
about 577
URL 577
if this, then that (IFTTT) 1
image signal processor (ISP) 65
image signal processor pipeline
for color video 65
independent basic set service (IBSS) 198
independent variable 492
indoor positioning systems (IPSs) 156
industrial and commercial, IoT and edge
about 578
cloud providers
commercial and industrial sensor 579
component manufacturers 580
edge computing and solutions companies 582
MEMS manufacturers and vendors 579
microprocessor manufacturers 580
middleware
operating systems
PAN communication companies 581
services companies
silicon manufacturers 580
WAN technology companies 582
industrial and manufacturing
IoT use cases 13
Industrial Internet Consortium
about 577
URL 577
Industrial IoT (IIoT) 12
industrial, scientific and medical (ISM) 108
industrial, scientific, and medical (ISM) 121
Infineon Technologies
URL 579
Inforce Computing
URL
information technology (IT) 194
information theory 94
Infrastructure as a Service (IaaS) 432, 434
infrastructure basic set service (BSS) 198
Ingress Protection 345
instruction-level parallelism (ILP) 322
instruction set architectures (ISA) 319, 320
integrated services (IntServ) 377
Intel
URL 580
Intel Boot Guard 530
interference mitigation techniques, IEEE 802.11
direct-sequence spread spectrum (DSSS) 205
frequency-hopping spread spectrum (FHSS) 205
OFDM 205
International Telecommunication Union (ITU) 106, 245
Internet Engineering Task Force
about 574
URL 574
Internet Engineering Task Force (IETF) 192
Internet Key Exchange (IKE) 375
Internet of Things (IoT) 49
use case 20
Internet Systems Consortium (ISC) 569
intersymbol interference (ISI) 104, 205
Invensense
URL 579
IOPS (input/output per second) 332
Iot
and DAG trust models 560
IoT
Bitcoin (blockchain-based) 555, 556, 557, 559
blockchains 553
cryptocurrencies 553
data analytics 468
example use cases 554
security 48
security best practices
threat 48
versus SCADA 39
IOTA
URL 561
IoT and security entities 578
IoT cyber attacks
anatomy 522
Chain Reaction 522
Mirai 522
Stuxnet 522
IoT data analytics
versus machine learning 515
IoT/Edge solution, components
cloud 36
data analytics 36
edge computing 36
local area networks (LANs) 36
security 37
sensor communication systems 36
sensors, actuators, and physical systems 36
sggregators, routers, gateways 36
IoT security best practices
holistic security
security checklist
IoT transaction
sensing nd power 45
IoT use cases
for agricultural and environmental 17
for consumer 13
for energy 17
for government and military 19
for healthcare 15
for industrial and manufacturing 13
for retail, finance, and marketing 14
for smart city 18
for transportation and logistics 16
IP
IPSO Alliance (IPSO) 571
IQ-samples 158
J
JSON Web Token (JWT) 409
K
key derivation function (KDF) 536
Key Management Protocol (KMP) 113
key performance indicator (KPI) 21
L
Lambda architecture
batch layer 480
service layer 481
speed layer 481
Last Will and Testament (LWT) 396
LE2M 144
learning rate 507
least significant bit (LSB) 321
least squares method 492
Lenovo
URL
Light Detection and Ranging (LiDAR) 58
light-out management (LOM) 371
LightWEightM2M (LwM2M) 572
linear classifier 490
linear regression 492
linear time invariant (LTI) 307
link layer roles (pre-connection)
master 128
slave 128
link-state routing 363
listen before talk (LB) 278
lithium-ion (Li-ion) battery 83
Long Range (LoRa) 243
long short-term memory (LSTM) 510
Long-Term Evolution (LTE) 248
Long-Term Evolution (LTE) technology 245
long-term key (LTK) 136
look-up table (LUT) 66
LoRa
about 300
LoRa Alliance
about 574
URL 574
LoRaWAN (Long Range wide area network)
about 300
summarizing 306
topology 305
Low Energy (LE) mode 114
Low Energy mode (LE) 115
low-power DDR (LPDDR) 329
low power node (LPN) 149
low-power wide area network (LPWAN) 316
low-power wide-area networks (LPWANs) 270
M
machine learning, IoT
about 483
Bayesian models 495
classification 488
convolutional neural network (CNN) 498
models 487
random forest 494
recurrent neural networks (RNN) 509
training and inference 514, 515
machine to machine (M2M) 8
about 37
versus IoT 39
versus SCADA 39
machine-to-machine (M2M) communication 416
majority decisions 495
management frames
association request frame 213
association response frame 213
authentication frame 213
beacon frame 213
deauthentication frame 213
disassociation frame 213
probe request frame 213
probe response frame 213
reassociation frame 213
reassociation response frame 213
management frames
types 213
manifest 357
man-in-the-middle (MITM) attacks 135
MapReduce
map phase 448
reduce phase 448
shuffle step 448
m assive machine-type communications (mMTC) 282
Massive-MIMO (M-MIMO) 286
master 117
maximum coupling loss (MCL) 102, 276
maximum transmission unit (MTU) 236
mean opinion score (MOS) 377
Media Access Control (MAC) 195
media access layer (MAC) 169
Medium Access Control (MAC)
memory hierarchy 325
memory types
MEMS accelerometers 60, 61, 62
MEMS microphones 62
MEMS pressure sensors 63
MEMS sensors 59
mesh link establishment (MLE)
message authentication codes (MAC) 536
message-orientated middleware (MOM) 388
message passing interfaces (MPI) 322
Message Queue Telemetry Transport (MQTT)
communication formats 404, 406, 407
packet structure 400, 401, 402
publish-subscribe 391, 392, 394, 395
state transitions 399
URL 390
messaging formats, CoAP
Acknowledgement (ACK) 420
Non-confirmable (NON) 420
Reset (RST) 420
messaging patterns, using in AMQP
asynchronous directed messages 430
request/reply or pub/sub 430
store and forward 430
Microchip
Microchip Technologies
URL 581
Microelectromechanical systems (MEMS) 59
Microsoft
URL
Microsoft Azure IOT Edge
about 355
architecture 356, 357, 358, 359
requisites 356
military and government
about 19
IoT use cases 19
minimal end devices (MEDs)
Mirai
working, scenarios 523
mist computing 449
mobile edge computing 312
Mobile wireless service (MWS) 116
ModBus
URL 568
models, SSP
Just WorksTM 135
numeric comparison 135
out-of-band (OOB) 135
passkey entry 135
more data (MD) flag 149
most significant bit (MSB) 321
MQTT
MQTT 3.1.1
reference link 407
MQTT 5
reference link 407
MQTT broker
selecting 415
MQTT communication formats
cleanSession 405
cleanStart 405
clientID 405
keepAlive 405
lastWillMessage 405
lastWillQos 405
lastWillRetain 405
lastWillTopic 405
password 405
Username 405
MQTT-SN
about 412
architecture and topology 412
multi-access edge computing (MEC) 291
multiaccess edge computing (MEC) 312
Multicast Protocol for Low-Power and Lossy Networks (MPL)
multicast routing 363
multihoming 229
multilevel cells (MLC) 335
multipath fading 208
multipath transmission 206
multiple input, multiple output (MIMO) 96
multiple-input multiple-output (MIMO)
about 206
spatial diversity 208
spatial multiplexing 208
multiprocessing 324
MUSIC 160
N
NAND flash memory
considerations 334
design 334
NaN (not a number error) 510
narrowband 102
National Institute for Standards and Technology (NIST) 563
National Institute of Standards and Technology
about 578
URL 578
National Security Telecommunications Advisory Committee
about 578
URL 578
National Telecommunications and Information Administration
about 578
URL 578
National Telecommunications and Information Administration (NTIA) 106
near-edge component 311
negative acknowledgement return codes 402
neighbor discovery (ND) 240, 241
about 238
Network Discovery (ND) phase 231
network firewall 380
network function virtualization (NFV) 297, 382
Networking as a Service (NaaS) 432
network layer (NWK) 180
nodes 555
nodes, 6LoWPAN mesh
edge routers 231
host nodes 231
router nodes 231
Non-orthogonal multiple access (NOMA) 289
non-standalone (NSA) 282
nonsymmetric protocol 396
non-volatile memory (NVMe) 331
Nordic Semiconductor
URL 581
north-south traffic 464
Nvidia
URL 581
NXP
URL 581
NXP Semiconductors
URL 579
O
Object Management Group (OMG)
URL 570
Office of Management and Budget (OMB) 562
OMA Specworks
URL 571
Omron
URL 580
on-board unit (OBU) 219
oneM2M
about 572
URL 572
Online Trust Alliance (OTA)
about 572
URL 572
onSemi
URL 580
On Semiconductor
URL 581
Open Automotive Alliance
URL 578
Open Connectivity Foundation
about 569
URL 569
OpenFog
about 576
URL 576
OpenFog Reference Architecture
about 450
accelerators 454
actuators 457
application services 451
compute 456
control systems 457
hardware platform infrastructure 457
hardware virtualization 453
network 454
network, component requirements 454
node management 453
node security 454
protocol abstraction 457
sensors 457
software backplane 453
stotage 456
Open Interconnect Foundation 569
Open Mobile Alliance (OMA) 571
Open Shortest Path First (OSPF) 364
Open Source Interconnection (OSI) model 194
OpenStack cloud architecture
Ceilometer 444
Cinder 442
Glance 438
Heat 443
Horizon 443
keystone 438
neutron 442
Swift 442
operating system tuning 350
operational technology (OT) 194
operation modes
CBC with Message Authentication Code (CBC-MAC) 540
cipher block chaining (CBC) 538
cipher feedback (CFB) chaining 540
Counter (CTR) 540
Electronic Codebook (ECB) 538
Output Feedback (OFB) Chaining 540
Organizationally Unique Identifier (OUI) 124
organizational unique identifier (OUI) 183
Organization for the Advancement of Structured Information Standards (OASIS)
about 570
URL 570
orphaning 184
orthogonal frequency-division multiplexing (OFDM) 200, 299
Orthogonal Sequence Spread Spectrum (OSSS)
out-of-band management (OOBM 371
output devices 68
Over-the-Air-Activation (OTAA) 304
over-the-air (OTA) 526
P
packet firewall 380
PAN consortia
about 566
Bluetooth 566
miscellaneous 568
Thread Group 566
Zigbee Alliance 568
PAN-to-WAN bridging
cached action 367
ignored action 366
transmitted action 367
PCI Express (PCIe) 341
peak-to-average power ratio (PAPR) 299
Peer Aware Communications (PAC) 113
Peplink
URL 582
perceptrons 484
performance-enhancing proxies (PEPs) 379
periodic advertising sync transfer (PAST) 165
Periodic Restricted Access Windows (PRAW) 228
personal area networks (PANs) 46
personal identification number (PIN) 135
physical and hardware security
about 528
key management and trusted platform modules 530, 531
processor and memory space 531
storage security 531
physical security
about 532
attack types 534
piconet 117
piezo-mechanical 77
piezo-mechanical harvesting 77
plane earth loss
versus free space loss 93
plane earth loss formula 91
Platform as a Service (PaaS) 432, 434
point of interest (POI) 137
point-of-sale (POS) 373
port forwarding 380
power efficiency 97
Power Limited region 98
power-line controller (PLC) 195
power-on self-test (POST) 348
Power Save Mode (PSM) 271
power-saving states, STA
non-TIM stations 228
traffic indication map (TIM) 228
unscheduled stations 228
power sources
preamble structures
802.11 a/g 211
802.11 b 211
802.11n 211
private cloud 435
processors
about 317
caches 325
characteristics 327
instruction set architectures (ISA) 319, 320
memory hierarchy 326
power 318
registers 319
speed 318
program-erase (PE) 336
programmable logic controllers (PLC) 525
programmable logic controllers (PLCs) 39, 310
proof-of-work (PoW) 557
Protocol consortia
about 569
Allseen Alliance 569
miscellaneous 572
Object Management Group (OMG) 570, 571
Open Connectivity Foundation 569
protocols
comparisons
provisioning
about 154
proxy PEP 379
pseudocapacitors 84
pseudo-noise (PN) 205
pseudo-random number generator (PRNG) 544
public key infrastructure (PKI) 548
publisher 392
publish-subscribe (pub/sub) 391
pulse density modulated (PDM) 63
PV6 over Low-Power Wireless Personal Area Networks (6LoWPAN) 195
pyroelectric infrared (PIR) sensors 56, 57
Q
QoS functions 376
quad-level cells (QLC) 335
quadrature amplitude modulation (QAM) 203
Qualcomm
URL 581
quality of service levels, MQTT
QoS-0 (non-assured transmission) 398
QoS-1 (assured transmission) 398
QoS-2 (assured service on applications) 398
quality of services (QoS) 376
R
radio access network (RAN) 312
radioactive power sources
Radiocommunication Sector (ITU-R) 245
radiofrequency (RF) energy harvesting 78
radio spectrum 105
random frequency and time-division multiple access (RFTDMA)
Realizable Region 98
real-time locating systems (RTLSs) 156
Received Signal Strength Indicator (RSSI) 115
Rectified linear unit (ReLU) 501
recurrent neural networks (RNNs) 485, 509, 510, 511, 512, 513
reduced instruction set computer (RISC)
about 320
versus complex instruction set computer (CISC) 320
reflections 91
registers 319
registration authority (RA) 548
regression
about 492
techniques 492
regression line 492
relay node 149
Remote Network Driver Interface Specification (RNDIS) 367
remote radio head (RRH) 291
resistance temperature detectors (RTDs) 52, 53
Restricted Access Window (RAW) 227
retail, finance, and marketing
about 14
IoT use cases 14
retained message 392
RF energy 89
RF interference 93
RIPng (RIP next generation) 364
Rivest-Shamir-Adleman algorithm (RSA) 542
road-side unit (RSU) 219
Robust Caching 162
roles, Thread architecture
border router
end devices
lead device
REEDs
sleepy end devices
Thread routers
Root of Trust (RoT)
starting methods 528
round trip time (RTT) 295
round-trip times (RTT) 447
Router-Eligible End Devices (REED)
Routing Information Protocol (RIP) 363, 364
routing paths
destination 365
device UID 365
flags 365
gateway 365
metric 365
types 366
routing schemes, 6LoWPAN mesh networks
mesh-under network 233
route-over network 233
RPL protocol
non-storing mode 235
storing mode 235
rule patterns
semantic 475
syntactic 475
RUMBLE IoT
URL
S
SaaS (software as a service) 355
SCADA (supervisory control and data acquisition) 37
scan mechanisms
active scanning 214
passive scanning 214
scanner 116
scatternet 117
sectors 224
secure shell (SSH) 535
secure simple pairing (SSP) 135
Secure Simple Pairing (SSP) 115
seebeck electromotive effect 50
Semtech
URL 582
sensing devices
about 50
sensor fusion, modes
centralized 67
decentralized 67
serializer/deserializer (SerDes) 341
Serial Peripheral Interface (SPI) 339
Service Access Points (SAP) 169
Service Change Indication feature 161
service-level agreement (SLA) 243
Shannon-Hartley theorem 95, 96, 97, 98, 99
Shannon limit 97
shared spectrum cellular 277
Shared Subscriptions 394
shell security
shortest path routing 362
Siddhi package 480
Sierra Wireless
URL 582
Sigfox
about 307
MAC layer
physical layer
protocol stack
topology
traits 307
Sigfox protocol stack
frame layer
MAC layer
PHY layer
sigmoid function 493
signal-to-noise ratio (SNR) 96, 204
Silicon Labs
URL 581
Simple (Streaming) Text Message-Oriented Middleware Protocol (STOMP) 427
single-instruction multiple-data (SIMD) 328
single-level cells (SLC) 335
slave 117
Sleep Clock Accuracy (SCA) 166
Slot availability masks (SAM) 116
Slot Availability Masks (SAMs) 124
smart city
about 18
deployment, characteristics 18
IoT use cases 18
SmokePing
reference link 447
snooping 379
SOCs
high-speed IO 341
Software as a Service (SaaS) 432, 434
software-defined networking (SDN) 297, 433, 570
benefits
traditional internetworking 385
Software-Defined Perimeter
about 551
architecture 551
software-defined perimeters (SDP) 433
Software-Defined Perimeters (SDPs)
software-defined wide-area network (SDWAN) 311
solutions, for scheduling URLCC packet
instant scheduling 296
reservation-based scheduling 296
space-division multiple access (SDMA) 217
sparse code multiple access (SCMA) 289
spatial division multiplexing (SDM) 217
spatial streams 208
Spectrum Resource Utilization (SRU) 113
split TCP 379
SSID
SSL (Secure Sockets Layer) 549
standalone (SA) 282
stateful firewall 380
stateful state 473
static routing 362
static wear leveling 336
ST Microelectronics
storage devices
cons 332
pros 332
Stuxnet
working 525
subject filtering 392
Submitting Memberships 570
subscriber 392
subscriber concealed identifier (SUCI) 293
subscriber permanent identifiers (SUPI) 293
subscription group 394
subspace algorithms 160
supercapacitors 84
supercapacitors, forms
electric double-layer capacitors (EDLC) 84
pseudocapacitors 84
SuperFrame interval (SO) 170
superscalar 323
supervised learning 487
supervisory control and data acquisition (SCADA) 12
SWOT (strengths, weaknesses, opportunities, and threats) 4
symmetric cryptography 537, 538, 540, 541
symmetric multithreading 324
synthetic sensing
T
tangle 560
Target Beacon Transmit Time (TBTT) 214
Target Wake Time (TWT) 229
TCP/IP network functions, edge
about 362
failover and out-of-band management 371, 372
PAN-to-WAN bridging 366, 367, 368, 369, 370
routing functions 362, 363, 364, 365
TCP/IP (transmission control protocol/internet protocol) 192, 193, 194
Technical Advisory Councils (TAC) 576
techniques, for mitigating PAPR effects
clipping 299
non-orthogonal multiple access 300
PTS 299
SLM 299
TE Connectivity
URL 580
telemedicine palliative care
about 20
cloud layer 22
edge layer, architecture 26, 27
far edge layer 22
far edge layer, architecture 24, 25
feature set and service requirements 21
near-edge PAN-WAN layer 22
software architecture 28, 29, 30, 31
Telit
URL 582
temperature sensor
about 50
benefits 54
use case 54
Temporal Key Integrity Protocol (TKIP) 216
TensorFlow
reference link 501
TensorFlow Playground 502
Texas Instruments
Texas Instruments CC2650 SensorTag 69, 70, 71
Texas Instruments infrared thermopile sensor (TMP007) 71
theoretical range 89
thermionic 78
thermistors 53
thermoelectric 78
thermoelectric generator (TEG) 78
thread
architecture and topology
Thread
about 241
addressing
architecture and topology
neighbor discovery
protocol stack
routing
Thread Group
about 566
reference link 566
thread-level parallelism (TLP) 323
time diversity 103
time division duplexing (TDD) 122
time-division multiple access (TDMA) 122
time-of-flight (ToF) 59
time-to-live (TTL) 151
TLS encryption
Topic Aliases 395
Topic Alias Maximum 396
topic exchange 428
Tracking Area Update (TAU) 271
traffic shaping functions 377
train nudging 123
transaction fee 558
Transmission Time Interval (TTI) 296
transparent gateway 413
transportation and logistics
about 15
IoT use cases 16
Transport Layer Security 549
Transport Layer Security (TLS) 241
trapdoor function 542
triple-level cells (TLC) 335
trusted execution environment (TEE) 530
Trusted Platform Modules (TPMs) 343
Trusted Platform Module (TPM) 332, 530
type filtering 392
typical Unix boot process 348
U
Ublox
URL 582
ultra-narrowband (UNB)
ultra-reliable and low-latency communications (URLLC) 282
umbrella organizations
about 576
IEEE IoT 577
Industrial Internet Consortium 576
miscellaneous 578
unified authentication framework 293
uniform linear array (ULA) 157
uniform rectangular array (URA) 157
uninterruptible power supply (UPS) 27
universal asynchronous receiver/transmitter (UART) 340
Universal Datagram Protocol (UDP) 193
Universal Plug and Play (UPnP) 569
universal resource identifier (URI) 388
universal resource locator (URL) 389
unsupervised learning 487
US-CERT
about 578
reference link 578
use cases, MQTT
QoS-0 398
QoS-1 398
QoS-2 398
user plane functions (UPF) 292
V
validation authority (VA) 548
vanishing gradient problem 506
vehicular ad hoc networks (VANET) 219
virtualization
about 351
hardware virtualization 351
para-virtualization 351
virtual machine (VM) 353
Voice over Internet Protocol (VOIP) 377
volatile memory 329
von-Neumann architecture 316
VPN
Generic Routing Encapsulation (GRE) 375
Internet Protocol Security (IPsec) VPN 374
Layer 2 Tunneling Protocol (L2TP 375
OpenVPN 374
WireGuard 374
W
WAN consortia
about 572
Internet Engineering Task Force 574
LoRa Alliance 574
Weightless SIG 572
Wi-Fi Alliance 575
Weightless SIG
about 572
URL 572
wide area network (WAN) 243
wideband 102
Wi-Fi Alliance
about 575
URL 575
Wi-Fi Protected Access (WPA) 196
wired equivalent privacy (WEP) 216
wireless body area network (WBAN) 87
wireless field area network (FAN) 87
wireless home area network (HAN) 87
wireless LAN (WLAN) 191
Wireless Life Sciences Alliance
URL 578
wireless local area network (WLAN) 87
wireless neighborhood area network (NAN) 87
wireless personal area networks (WPANs) 243
World Radio Conference (WRC) 282
WPA2 216
WPA pre-shared key (WPA-PSK) 216
Y
year over year (YoY) 22
Z
Zigbee
about 177
addressing 182
association 184
history 177
link key 185
MAC 180
master key 185
mesh routing 183
network key 185
overview 178
packet structure 182
PHY 180
security 184
Zigbee Alliance
about 568
URL 568
Zigbee, controllers
bridge controller 188
installer controller 188
status update controller 188
SUC ID server (SIS) 188
Zigbee controller (ZC) 178
Zigbee coordinator (ZC) 184
Zigbee device object (ZDO) 180
Zigbee end devices (ZED) 184
Zigbee end device (ZED) 178
Zigbee Light Link (ZLL) 526
Zigbee, packet routing methods
broadcasting 183
mesh routing (table routing) 183
source routing 183
tree routing 183
Zigbee router (ZR) 178
Zigbee security model
application layer 185
network layer 185
Zigbee, slaves
enhanced slave 188
routing slave 188
Zigbee, topologies
cluster tree 179
mesh network 179
star network 179
Z-Wave
about 186
addressing
controller device 187
overview 187
routing
slave device/node 188
topology
Z-Wave Alliance
URL 568
Z-Wave protocol stack
about 189
application layer 189
MAC layer 189
PHY layer 189
routing layer 189
transfer layer 189
18.188.218.184