Coverart for item
The Resource Beyond the Internet of Things : everything interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors

Beyond the Internet of Things : everything interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors

Label
Beyond the Internet of Things : everything interconnected
Title
Beyond the Internet of Things
Title remainder
everything interconnected
Statement of responsibility
Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors
Contributor
Editor
Subject
Language
eng
Summary
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions
Member of
Cataloging source
N$T
Dewey number
004.67/8
Index
no index present
LC call number
TK5105.8857
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
  • 1978-
  • 1974-
  • 1971-
http://library.link/vocab/relatedWorkOrContributorName
  • Batalla, Jordi Mongay
  • Mastorakis, George
  • Mavromoustakis, Constandinos X.
  • Pallis, Evangelos
Series statement
Internet of things, Technology, communications and computing,
http://library.link/vocab/subjectName
  • Internet of things
  • Engineering
  • Communications Engineering, Networks
  • Information Systems Applications (incl. Internet)
  • Engineering Economics, Organization, Logistics, Marketing
Label
Beyond the Internet of Things : everything interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors
Instantiates
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Introduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary
  • AcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties
  • 4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview of Internet of Things Security; 2.2 Security Goals for the Internet of Things; 2.2.1 Confidentiality; 2.2.2 Integrity; 2.2.3 Availability; 2.2.4 Authentication; 2.2.5 Access Control; 2.2.6 Non-repudiation; 2.2.7 Secure Booting
  • 2.2.8 Device Tampering Detection2.3 Where Internet of Things Security Becomes Delicate; 2.3.1 Challenges of Implementing Security for IoT; 2.3.2 Hardware Issues; 2.4 Size and Heterogeneity of Things; 2.4.1 Size of IoT; 2.4.2 Heterogeneity of the IoT; 2.5 Privacy Concerns in the Internet of Things; 3 Fundamental Internet of Things Security Issues; 3.1 Things Are not Designed with Security in Mind; 3.1.1 Testing the Security of IoT Devices; 3.2 Open Debugging Interfaces; 3.3 Inappropriate Network Configuration and Use of Default Passwords by Users
  • 3.4 Lack of Encryption of Critical Information Before Storage3.5 Current and Emerging IoT Cyber Threat Landscape; 3.5.1 Internet of Things Cyber Assets; 3.5.2 Vulnerabilities Associated with IoT Devices; 3.6 Overview of Internet of Things Threat Agents; 4 IoT Security Issues that Need Immediate Attention; 4.1 Efficient Lightweight Authentication Schemes for IoT; 4.2 Robust and Flexible Lightweight Cryptography; 4.3 Need for Efficient Key Revocation Schemes; 4.4 Need for Standardization of Security Solutions; 5 Conclusions; Acknowledgments; References; Technologies for Connecting Everything
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783319507583
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-50758-3
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
ocn967656031
Label
Beyond the Internet of Things : everything interconnected, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis, editors
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Introduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary
  • AcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties
  • 4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview of Internet of Things Security; 2.2 Security Goals for the Internet of Things; 2.2.1 Confidentiality; 2.2.2 Integrity; 2.2.3 Availability; 2.2.4 Authentication; 2.2.5 Access Control; 2.2.6 Non-repudiation; 2.2.7 Secure Booting
  • 2.2.8 Device Tampering Detection2.3 Where Internet of Things Security Becomes Delicate; 2.3.1 Challenges of Implementing Security for IoT; 2.3.2 Hardware Issues; 2.4 Size and Heterogeneity of Things; 2.4.1 Size of IoT; 2.4.2 Heterogeneity of the IoT; 2.5 Privacy Concerns in the Internet of Things; 3 Fundamental Internet of Things Security Issues; 3.1 Things Are not Designed with Security in Mind; 3.1.1 Testing the Security of IoT Devices; 3.2 Open Debugging Interfaces; 3.3 Inappropriate Network Configuration and Use of Default Passwords by Users
  • 3.4 Lack of Encryption of Critical Information Before Storage3.5 Current and Emerging IoT Cyber Threat Landscape; 3.5.1 Internet of Things Cyber Assets; 3.5.2 Vulnerabilities Associated with IoT Devices; 3.6 Overview of Internet of Things Threat Agents; 4 IoT Security Issues that Need Immediate Attention; 4.1 Efficient Lightweight Authentication Schemes for IoT; 4.2 Robust and Flexible Lightweight Cryptography; 4.3 Need for Efficient Key Revocation Schemes; 4.4 Need for Standardization of Security Solutions; 5 Conclusions; Acknowledgments; References; Technologies for Connecting Everything
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783319507583
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-50758-3
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
ocn967656031

Library Locations

Processing Feedback ...