IoT Standards with Blockchain: Enterprise Methodology for Internet of Things
- Length: 292 pages
- Edition: 1
- Language: English
- Publisher: Apress
- Publication Date: 2021-10-06
- ISBN-10: 1484272706
- ISBN-13: 9781484272701
- Sales Rank: #0 (See Top 100 Books)
Implement a standardized end-to-end IoT implementation based on best practices and proven successes in IoT across multiple industries. With this book you’ll discover the three business strategies for enterprises to adopt and remain relevant in the marketspace ―the Customer Engagement strategy, the Business Transformation strategy, and the Business Productivity Improvement strategy. Pick the right strategy for your enterprise to ensure a clear mission and vision is established based on which IoT roadmap can be defined. Subsequently all business processes pertaining to the chosen business strategy are investigated to define use cases where IoT can be adopted to achieve that business strategy.
Start by learning the generic industry perspective on digital transformation using IoT. Then move on to the IoT Standards Reference Model. It’s an abstract framework consisting of an interlinked set of clearly defined components for enterprises to successfully implement an IoT solution. The IoT Standards Reference Model can be applied for IoT use cases across any industry and is kept abstract in order to enable many, potentially different, IoT architectures to be implemented based on the model.
With IoT thoroughly covered, you’ll dive into Blockchain and AI technology. This book will discuss the importance of using private blockchains for IoT use cases. You’ll also discover the five IoT-Blockchain implementation patterns that enterprises can enable for seamless communication between IoT devices, IoT Smart Gateways, and IoT platforms. These patterns help achieve trust, interoperability, and extendibility. Then you’ll work with AI and the IoT Standards Reference Model. The reference model recommends applying AI patterns to generate insights from data and take appropriate actions automatically.
IoT Standards with Blockchain also provides perspective on how and when to apply AI in an IoT Context. In the end, you’ll have a solid methodology to execute large scale, enterprise-level IoT implementations. You’ll have an enterprise digital transformation framework for IoT that will enable your enterprise to operate better.
What You’ll Learn
- Facilitate IoT interoperability with best practices
- Implement IoT platform security
- Feed data and analytics to AI models
Who This Book Is For
C-suite leaders and IT program managers across all industries, including manufacturing (Industry 4.0), logistics, oil and gas, transportation, energy, mining and metals, aviation, pharmaceuticals, medical devices, and hospitality.
Table of Contents About the Author About the Technical Reviewer Introduction Part I: IoT Business Strategy Chapter 1: Getting Started Designing Business for Future The Internet of Things As a Digital Enabler Operational Technology – A Preview The IT-OT Integration The Triple Challenges in IoT Business Strategy IoT Security IoT Interoperability Device Interoperability Network Interoperability Semantic Interoperability Syntactic Interoperability Platform Interoperability Summary Chapter 2: IoT Business Strategy Customer Engagement Strategy Business Transformation Strategy Process Transformation Model Transformation Domain Transformation Business Productivity Improvement Choosing Between Customer Engagement, Business Transformation, and Business Productivity Improvement Strategy Summary Chapter 3: IoT Standards Business Transformation Model What’s Next After Business Strategy Is Chosen The IoT Use Case Reference Model (IoT UCR Model) Applying IoT Treatments on Use Cases Heterogeneous IoT Transform Homogeneous IoT Transform Summary Part II: The IoT Standards Reference Model Chapter 4: The IoT Standards Reference Model The IoT Standards Reference Model Devices (the Sensors and Actuators) Smart IoT Gateways Device Communication Is the First Function of the Gateway Device Management Is Another Essential Function Performed by Some Gateways Edge Computing Is the Third Important Function for Smart IoT Gateways Challenges with Smart Gateways Full Stack IoT Platform AI (Artificial Intelligence) Is an Important Function Performed by the IoT Platform and in Some Cases Performed at the IoT Gateway Level (Called Edge IT) Typical Activities Performed by the Smart IoT Gateway and Full Stack IoT Platform Security Device Security Smart IoT Gateway Security IoT Platform Security Blockchain Summary Chapter 5: IoT Devices and Their Communication Device Types Small Things (Type 1 Devices) Big Things (Type 2 Devices) Complex Things (Type 3 Devices) Communication Protocols LPWAN (Low-Power Wide Area Network) Satellite Communications Networks (3G/4G/5G) Radio Frequency (RF) Networks Bluetooth Wi-Fi RFID The Wired Networks Choosing the Right Smart IoT Gateway for Industry Use Cases Summary Chapter 6: The Smart IoT Gateway Security IT-OT Team Integration Data Volume and Analytics Lack of Standard Communication (Data) Protocols Diversity of Products and Platforms Return on Investment IoT Gateways Smart IoT Gateways Choosing the Right Smart IoT Gateway Data Size and Storage Capability Data Processing Capability at the IoT Gateway Level Is Another Mandate Ruggedness of the IoT Gateway Interoperability (Connectivity Requirement) Security Legacy Device Integration Scalability IoT Gateway Comparisons Hewlett Packard Enterprise Dell AAEON Digi International Huawei Summary Chapter 7: IoT Cloud Platform IoT Basic Six Reliability and Availability Scalability Cloud Elasticity Vertical Scaling Horizontal Scaling Autoscaling Disaster Recovery Data Security Pricing Model Certifications and Standards Company Profile Specific Capabilities Connectivity Device Management Device Onboarding and Provisioning Device Configuration Device Maintenance Application Enablement Platforms (IoT Platform with Superior Application Development Capabilities) Scalability (Large-Scale) Device Onboarding Capabilities Data Storage and IoT Analytics Proof of Concept (POC) Summary Chapter 8: Security in IoT Secure by Design (Securing the Whole IoT Ecosystem) Buy Devices with Built-in Security Protecting Devices API Security Smart IoT Gateway Security Identity and Access Control (IAC) Over-the-Air Updates and Secure Boot Visibility and Threat Detection Patch Management/Continuous Software Updates Hardware Security IoT Platform Security Securing IoT Using Blockchain Summary Part III: AI and Blockchain As Enablers for IoT Chapter 9: Blockchain with IoT Public Blockchain Private Blockchain Hyperledger Blockchain Benefits Almost Every Industry Today IoT Blockchain Implementation Patterns Pattern 1: Device ➤ IoT Cloud Platform ➤ Blockchain Pattern 2: Device ➤ IoT Gateway ➤ IoT Cloud Platform ➤ Blockchain Pattern 3: Device ➤ IoT Gateway ➤ Blockchain Pattern 4: Device ➤ Blockchain Pattern 5: Device ➤ IoT Gateway ➤ IoT Platform Apply Integration Patterns Wisely Building Blocks for IoMT and Associated Challenges Ingestion of Data Latency Number of Devices Interoperability Late Arrival of Data Data Duplication Data Formats Summary Chapter 10: Artificial Intelligence in the IoT World (Applied IoT) Robotic Process Automation Artificial Intelligence Data Science The Link Between Artificial Intelligence and Data Science Importance of Quality Data Artificial Intelligence and IoT Lessons Learned in Applying AI in IoT Use Cases (Applied IoT) POC Is Not Successful, Until It Can Scale AI Needs Enough Data and Time to Learn Be Specific on What to Achieve Get a Model into Action If It Works Fine, Instead of Aspiring to Do More AI Summary Part IV: IoT Implementation Aspects Chapter 11: Big Data and Analytics Debugging Capabilities Timeliness and Accuracy of Data Brought Together Where Should Data Management and Insights Happen Data Storage Considerations (What Data Needs to Be Stored and What Needs to Be Discarded Rapid Provisioning of Storage Is Another Key Requirement Data Management with Fog Computing Automated Data Decisions Data Security and Privacy Remains to Be a Big Concern Across Industries in IoT (Big) Data-First Reference Model The Data Source The Data Storage Layer Data Extraction Layer and Data Processing Layer Data Consumption Layer Data Governance Summary Chapter 12: Product Mindset for IoT Use Case Implementation Product Organization IoT Product Life Cycle with Product Mindset Hypothesis to Cash Agile Software Development Methodology in IoT Use Case Development Agile – A De Facto Methodology for IoT Use Case Development Summary Chapter 13: IoT Product Team IoT Product Team Operational Technology Lead Security Advisor Product Development Teams DevSecOps Enables Faster Delivery Time DevSecOps Manages the Scale and Is Proactively Secure Manage Rigorous Interoperability Testing and Ensure Availability Information Technology Lead Big Data Lead IoT Champion IoT Product Team Identification The Cost Implications of a Traditional Pyramid Hackfest Model to Identify Product Development Teams Shortlisting Product-Focused Evaluation Behavioral Evaluation Trainings Summary Summary of the Book Index
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/Apress
2. In the Find a repository… box, search the book title: IoT Standards with Blockchain: Enterprise Methodology for Internet of Things
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.