<span>This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/futur
Communication Technologies and Security Challenges in IoT: Present and Future (Internet of Things)
โ Scribed by Ajay Prasad (editor), Thipendra P. Singh (editor), Samidha Dwivedi Sharma (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 575
- Edition
- 2024
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.
๐ SIMILAR VOLUMES
<p><p>This book presents methods for advancing green IoT sensor networks and IoT devices. Three main methods presented are: a standalone system to support IoT devices that is informed by the amount of energy the solar array system can produce; a model of securing a building's main power supply again
<P>The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being p
This volume deals with the processes involved in surpassing diversified architecture, protocol, communications, integrity and security along with ubiquitous data collection, potential for unexpected uses of consumer data and heightened security risks.ย The basic objective of the proposed volume is f
This volume deals with the processes involved in surpassing diversified architecture, protocol, communications, integrity and security along with ubiquitous data collection, potential for unexpected uses of consumer data and heightened security risks.ย The basic objective of the proposed volume is f