Limit this search to....

Industrial Iot: Challenges, Design Principles, Applications, and Security 2020 Edition
Contributor(s): Butun, Ismail (Editor)
ISBN: 3030424995     ISBN-13: 9783030424992
Publisher: Springer
OUR PRICE:   $189.99  
Product Type: Hardcover - Other Formats
Published: July 2020
Qty:
Additional Information
BISAC Categories:
- Computers | Networking - Hardware
- Technology & Engineering | Electrical
- Computers | Information Technology
Physical Information: 0.63" H x 6.14" W x 9.21" (1.20 lbs) 241 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy.

In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT.

The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT.

Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.