Book description
Augment your IoT skills with the help of engaging and enlightening tutorials designed for Raspberry Pi 3
About This Book
- Design and implement state-of-the-art solutions for the Internet of Things
- Build complex projects using motions detectors, controllers, sensors, and Raspberry Pi 3
- A hands-on guide that provides interoperable solutions for sensors, actuators, and controllers
Who This Book Is For
If you're a developer or electronic engineer and are curious about the Internet of Things, this is the book for you. With only a rudimentary understanding of electronics and Raspberry Pi 3, and some programming experience using managed code, such as C# or Java, you will be taught to develop state-of-the-art solutions for the Internet of Things.
What You Will Learn
- Create your own project, run and debug it
- Master different communication patterns using the MQTT, HTTP, CoAP, LWM2M and XMPP protocols
- Build trust-based as hoc networks for open, secure and interoperable communication
- Explore the IoT Service Platform
- Manage the entire product life cycle of devices
- Understand and set up the security and privacy features required for your system
- Master interoperability, and how it is solved in the realms of HTTP,CoAP, LWM2M and XMPP
In Detail
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. Mastering Internet of Things starts by presenting IoT fundamentals and the smart city. You will learn the important technologies and protocols that are used for the Internet of Things, their features, corresponding security implications, and practical examples on how to use them. This book focuses on creating applications and services for the Internet of Things. Further, you will learn to create applications and services for the Internet of Things. You will be discover various interesting projects and understand how to publish sensor data, control devices, and react to asynchronous events using the XMPP protocol. The book also introduces chat, to interact with your devices. You will learn how to automate your tasks by using Internet of Things Service Platforms as the base for an application. You will understand the subject of privacy, requirements they should be familiar with, and how to avoid violating any of the important new regulations being introduced.
At the end of the book, you will have mastered creating open, interoperable and secure networks of things, protecting the privacy and integrity of your users and their information.
Style and approach
This mastering-level guide will immerse you in the advanced functionalities of IoT, along with extending them, and finishes up with security and privacy techniques.
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Contributors
- Preface
- Preparing Our First Raspberry Pi Project
- Creating a Sensor to Measure Ambient Light
- Creating an Actuator for Controlling Illumination
- Publishing Information Using MQTT
-
Publishing Data Using HTTP
-
Introducing the HTTP protocol
- Locating a resource
- Understanding the Request/Response pattern
- Handling sessions
- Limiting connectivity
- Choosing a connection direction
- Understanding methods
- Updating resources
- Interacting with resources
- Encoding content
- Applying headers
- Optimizing requests
- Sending content
- Understanding status codes
- Using encryption
- Validating certificates
- Redefining the web
- Preparing our project
- Adding dynamic synchronous resources
- Adding dynamic asynchronous resources
- Summary
-
Introducing the HTTP protocol
- Creating Web Pages for Your Devices
- Communicating More Efficiently Using CoAP
- Interoperability
-
Social Interaction with Your Devices Using XMPP
- Introducing XMPP
- Adding XMPP to our devices
- Summary
-
The Controller
- Discovering things on the internet
- Registering our devices
-
Creating a controller
- Identifying things
- Finding friends in the roster
- Limiting the search domain
- Performing the search
- Picking suitable devices
- Making new friends
- Reacting to roster events
- Adding a friend
- Losing a friend
- Reacting to revoked presence subscriptions
- Reacting to presence changes
- Interacting with devices
- Subscribing to sensor data events
- Reacting to sensor data events
- Collecting relevant sensor data
- Calculating control output
- Performing control action
- Recovering from stale states
- Re-subscribing to sensor data
- Invalidating existing friendships
- Reconfiguring the controller
- Decommissioning of devices
- Summary
- Product Life Cycle
-
Concentrators and Bridges
- Introducing concentrators
- Referencing embedded nodes
- Managing a concentrator
- Implementing a concentrator
- Adding provisioning support to the concentrator
- Summary
-
Using an Internet of Things Service Platform
- Understanding the IoT Gateway project
- Running the IoT Gateway
- Configuring the IoT Gateway
-
Providing web content
- Publishing network folders
- Using Markdown
- Using metadata for Search Engine Optimization
- Providing menus using the Master/Detail model
- Customizing the user experience
- Adding security headers
- Authorizing user privileges
- Customizing content using server-side script
- Customizing code visualization
- Customizing multimedia presentation
- Pushing information to web clients
- Monitoring performance
- Developing services for the IoT Gateway
- Summary
- IoT Harmonization
-
Security for the Internet of Things
- Understanding the risks
- Getting to a bad place
- Understanding the root causes
- Looking at alternative options
- Getting to a better place
-
Mastering data protection technologies
- Skimming the basics of encryption
- Protecting data integrity
- Understanding key sizes
- Using certificates
- Avoiding self-signed certificates
- Avoiding creating a Certificate Authority
- Using tokens to transport claims
- Enforcing ubiquitous encryption
- Creating checklists
- Updating your firmware
- Distributing your risks
- Avoiding leaking data unintentionally
- Summary
-
Privacy
- Defining privacy
-
Introducing the GDPR
- Balancing rights
- Measuring proportionality
- Defining personal data
- Anonymizing data
- Defining processing
- Doing as little as possible
- Informing the data subjects
- Finding your legal grounds
- Avoiding certain topics
- Distributing responsibilities
- Avoiding sanctions
- Assisting controllers and processors
- Protecting personal data
- Giving individual rights
- Solving the puzzle
- Summary
- Other Books You May Enjoy
Product information
- Title: Mastering Internet of Things
- Author(s):
- Release date: March 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788397483
You might also like
book
Enterprise Internet of Things Handbook
Get familiar with the building blocks of IoT solutions using off?the-shelf IoT platforms. About This Book …
book
Home Network Basis: Transmission Environments and Wired/Wireless Protocols
This complete technical guide to home network media, protocols, and implementation is the first systematic technical …
book
Using browsers with hardware for embedded systems
We think of web browsers as running on desktop or mobile devices, but browsers can also …
book
Internet of Things
This book addresses researchers and graduate students at the forefront of study/research on the Internet of …