Availability: In Stock

Industrial IoT Challenges, Design Principles, Applications, and Security 1st Edition

SKU: 9783030425005

Original price was: $189.00.Current price is: $24.99.

Access Industrial IoT Challenges, Design Principles, Applications, and Security 1st Edition Now. Discount up to 90%

Additional information

Full Title

Industrial IoT Challenges, Design Principles, Applications, and Security 1st Edition

Author(s)

Ismail Butun

Edition

1st Edition

ISBN

9783030425005, 9783030424992

Publisher

Springer

Format

PDF and EPUB

Description

The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.