Orchestrating and Automating Security for the Internet of Things


Book Description

Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. · Understand the challenges involved in securing current IoT networks and architectures · Master IoT security fundamentals, standards, and modern best practices · Systematically plan for IoT security · Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks · Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions · Implement platform security services including identity, authentication, authorization, and accounting · Detect threats and protect data in IoT environments · Secure IoT in the context of remote access and VPNs · Safeguard the IoT platform itself · Explore use cases ranging from smart cities and advanced energy systems to the connected car · Preview evolving concepts that will shape the future of IoT security




IoT Fundamentals


Book Description

Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all. The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions. Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them. Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks Presents start-to-finish configuration examples for common deployment scenarios Reflects the extensive first-hand experience of Cisco experts




Demystifying Internet of Things Security


Book Description

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.




Security Policies and Implementation Issues


Book Description

"This book offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks."--




Cognitive Hyperconnected Digital Transformation


Book Description

Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex info




IoT Automation


Book Description

This book presents an in-depth description of the Arrowhead Framework and how it fosters interoperability between IoT devices at service level, specifically addressing application. The Arrowhead Framework utilizes SOA technology and the concepts of local clouds to provide required automation capabilities such as: real time control, security, scalability, and engineering simplicity. Arrowhead Framework supports the realization of collaborative automation; it is the only IoT Framework that addresses global interoperability across multiplet SOA technologies. With these features, the Arrowhead Framework enables the design, engineering, and operation of large automation systems for a wide range of applications utilizing IoT and CPS technologies. The book provides application examples from a wide number of industrial fields e.g. airline maintenance, mining maintenance, smart production, electro-mobility, automative test, smart cities—all in response to EU societal challenges. Features Covers the design and implementation of IoT based automation systems. Industrial usage of Internet of Things and Cyber Physical Systems made feasible through Arrowhead Framework. Functions as a design cookbook for building automation systems using IoT/CPS and Arrowhead Framework. Tools, templates, code etc. described in the book will be accessible through open sources project Arrowhead Framework Wiki at forge.soa4d.org/ Written by the leading experts in the European Union and around the globe.




AI-Driven IoT Systems for Industry 4.0


Book Description

The purpose of this book is to discuss the trends and key drivers of Internet of Things (IoT) and artificial intelligence (AI) for automation in Industry 4.0. IoT and AI are transforming the industry thus accelerating efficiency and forging a more reliable automated enterprise. AI-driven IoT systems for Industry 4.0 explore current research to be carried out in the cutting-edge areas of AI for advanced analytics, integration of industrial IoT (IIoT) solutions and Edge components, automation in cyber-physical systems, world leading Industry 4.0 frameworks and adaptive supply chains, etc. A thorough exploration of Industry 4.0 is provided, focusing on the challenges of digital transformation and automation. It covers digital connectivity, sensors, and the integration of intelligent thinking and data science. Emphasizing the significance of AI, the chapter delves into optimal decision-making in Industry 4.0. It extensively examines automation and hybrid edge computing architecture, highlighting their applications. The narrative then shifts to IIoT and edge AI, exploring their convergence and the use of edge AI for visual insights in smart factories. The book concludes by discussing the role of AI in constructing digital twins, speeding up product development lifecycles, and offering insights for decision-making in smart factories. Throughout, the emphasis remains on the transformative impact of deep learning and AI in automating and accelerating manufacturing processes within the context of Industry 4.0. This book is intended for undergraduates, postgraduates, academicians, researchers, and industry professionals in industrial and computer engineering.




Reshaping Intelligent Business and Industry


Book Description

The convergence of Artif icial Intelligence (AI) and Internet of Things (IoT) is reshaping the way industries, businesses, and economies function; the 34 chapters in this collection show how the full potential of these technologies is being enabled to create intelligent machines that simulate smart behavior and support decision-making with little or no human interference, thereby providing startling organizational efficiencies. Readers will discover that in Reshaping Intelligent Business and Industry: The book unpacks the two superpowers of innovation, AI and IoT, and explains how they connect to better communicate and exchange information about online activities; How the center and the network's edge generate predictive analytics or anomaly alerts; The meaning of AI at the edge and IoT networks. How bandwidth is reduced and privacy and security are enhanced; How AI applications increase operating efficiency, spawn new products and services, and enhance risk management; How AI and IoT create 'intelligent' devices and how new AI technology enables IoT to reach its full potential; Analyzes AIOT platforms and the handling of personal information for shared frameworks that remain sensitive to customers’ privacy while effectively utilizing data. Audience This book will appeal to all business and organization leaders, entrepreneurs, policymakers, and economists, as well as scientists, engineers, and students working in artificial intelligence, software engineering, and information technology.




End-User Development


Book Description

Work practices and organizational processes vary widely and evolve constantly. The technological infrastructure has to follow, allowing or even supporting these changes. Traditional approaches to software engineering reach their limits whenever the full spectrum of user requirements cannot be anticipated or the frequency of changes makes software reengineering cycles too clumsy to address all the needs of a specific field of application. Moreover, the increasing importance of ‘infrastructural’ aspects, particularly the mutual dependencies between technologies, usages, and domain competencies, calls for a differentiation of roles beyond the classical user–designer dichotomy. End user development (EUD) addresses these issues by offering lightweight, use-time support which allows users to configure, adapt, and evolve their software by themselves. EUD is understood as a set of methods, techniques, and tools that allow users of software systems who are acting as non-professional software developers to 1 create, modify, or extend a software artifact. While programming activities by non-professional actors are an essential focus, EUD also investigates related activities such as collective understanding and sense-making of use problems and solutions, the interaction among end users with regard to the introduction and diffusion of new configurations, or delegation patterns that may also partly involve professional designers.




Internet of Things


Book Description

This book constitutes revised selected papers from the refereed proceedings of the 5th The Global IoT Summit, GIoTS 2022, which took place in Dublin, Ireland, in June 20–23, 2022. The 33 full papers included in this book were carefully reviewed andselected from 75 submissions. They were organized in topical sections as follows: ioT enabling technologies; ioT applications, services and real implementations; ioT security, privacy and data protection; and ioT pilots, testbeds and experimentation results.