Account
Orders
Advanced search
Architectures, Security, Reliability, and Interoperability for MIoT
Louise Reader
Read on Louise Reader App.
This open-access book examines the military applications of the Internet of Things in three main parts: (I) Motivation and Use Cases, (II) Challenges and Solutions, and (III) Experimental Results and Recommendations. The first part describes the motivation and selected Military IoT (MIoT) application areas. The second part provides an overview of the specific requirements that MIoT applications must meet, including the ability to process large volumes of diverse data, support for increased automation, robust device and network security, and resilience against electronic warfare measures. It examines existing architectural frameworks for IoT ecosystems and the challenges of integrating these frameworks into current military infrastructure, including communications, and proposes architectural patterns for integrating IoT into the military domain. Part II evaluates current IoT-related technologies for sensing, actuation, and communication relevant to the military domain. It also offers a comprehensive overview of various aspects of IT network security in military applications, including the concept of Data-Centric Security, which is viewed as a promising security model for future NATO operations. Other security considerations include securing data exchange between the IoT networks and federated C2 systems, leveraging publish-subscribe services, and incorporating trusted hardware components, such as TPM, into IoT devices to improve security. Part II also outlines a comprehensive approach to ensuring reliability and security across all layers and stages of the MIoT lifecycle and evaluates the suitability of selected fault-tolerance techniques in MIoT, including the need for fault-tolerance methods to be consistently applied across all layers. Part III summarizes five different categories of experiments conducted by the authors on a distributed NATO testbed at multiple physical locations to test and validate IoT technologies and their applications within the military domain.
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
This ebook is DRM protected.
LCP system provides a simplified access to ebooks: an activation key associated with your customer account allows you to open them immediately.
ebooks downloaded with LCP system can be read on:
Adobe DRM associates a file with a personal account (Adobe ID). Once your reading device is activated with your Adobe ID, your ebook can be opened with any compatible reading application.
ebooks downloaded with Adobe DRM can be read on:
mobile-and-tablet To check the compatibility with your devices,see help page
Niranjan Suri is the Associate for Research in the Military Information Sciences Division at the US Army DEVCOM Army Research Laboratory and an Associate Director and Senior Research Scientist at the Florida Institute for Human & Machine Cognition (IHMC). He received his B.Sc. and M.Sc. in Computer Science from the University of West Florida and his Ph.D. in Computer Science from Lancaster University. His research interests include Internet of Things, Network and Communication Protocols, Distributed Systems, and Information Management. He has authored or co-authored over 250 peer-reviewed papers, holds multiple patents, and has co-edited two books.
Konrad Wrona is a Principal Scientist at the NATO Cyber Security Centre in The Hague, Netherlands, where he leads the Research, Policy, and Innovation (RPI) team. He also holds a research position at the Military University of Technology in Warsaw, Poland. Konrad has more than 20 years of experience in both industrial (Ericsson Research and SAP Research) and academic (RWTH Aachen University, Media Lab Europe, and Rutgers University) research and development environments. He earned his M.Eng. in
Telecommunications from Warsaw University of Technology, Poland, in 1998, and his Ph.D. in Electrical Engineering from RWTH Aachen University, Germany, in 2005. He is an author and co-author of over a hundred publications and holds several patents. His professional interests include a wide range of security issues in information systems, communication networks, wireless and mobile applications, distributed systems, and the Internet of Things. Konrad Wrona is a Senior Member of the IEEE, a Senior Member of the ACM, and a member of IACR.
Zbigniew Zielinski received his Ph.D. in Computer Science in 1988 and his D.Sc. (habilitation) from Military University of Technology (MUT) in 2014. He currently holds a professor position at the MUT in Warsaw. He is an author and a co-author of over ninety papers in the refereed journals and conference proceedings. His current research interests include computer systems dependability and security, fault-tolerant systems, Internet of Things, as well formal methods for ICT systems modeling and validation. He participated both as a team member and a project leader in several R&D projects concerned embedded real-time computer systems, dependability and cybersecurity of CPS systems. Currently he is an expert of the Polish Accreditation Committee and a Member of the IEEE.
Sign up to get our latest ebook recommendations and special offers