Veze, linkovi
Kompjuter biblioteka
IoT: Building Arduino-Based Projects

Internet Internet

IoT: Building Arduino-Based Projects

Autor: Peter Waher et al.
Broj strana: 715
ISBN broj: 9781787120631
Godina izdanja: 2017.

Twitter   Facebook   Linkedin   Pinterest   Email
Predlog za prevod


What You Will Learn

  • Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
  • Use important communication patterns, such as the request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
  • Build a portable Wi-Fi signal strength sensor to give haptic feedback about signal strength to the user
  • Measure the water flow speed and volume with liquid flow sensors and record real-time readings
  • Secure your home with motion-activated Arduino security cameras and upload images to the cloud
  • Implement real-time data logging of a solar panel voltage with Arduino cloud connectors
  • Track locations with GPS and upload location data to the cloud
  • Control infrared-enabled devices with IR remote and Arduino
  • Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem

Book Description

The IoT: Building Arduino-Based Projects course will take you on a journey to become an expert in the use of IoT by developing a set of projects and finally guide you onto securing your IoT environment.

The course begins with exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. In the first module Learning Internet of Things, you will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. This module gives you a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things.

The second module, Internet of Things with Arduino Blueprints provides you up to eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users―creating smart, pervasive, and always-connected environments. You can use these projects as blueprints for many other IoT projects and put them to good use.

It has becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. Thus, our third module, Practical Internet of Things Security provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The aim is to showcase how the IoT is implemented in early adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.


Peter Waher

Peter Waher is the cofounder of Clayster, a company with its origin in Scandinavia but now operates in four continents. Clayster is dedicated to the development of Internet of Things applications and provides an IoT platform for rapid application development. Currently, Peter lives and works in Chile where he is the CEO of Clayster Laboratorios Chile S.A., a subsidiary of Clayster that provides development expertise to partner companies and promotes the Internet of Things technology to research institutions. Originally a mathematician, commercial pilot, and computer games developer, he has worked for 20 years with computers and device communication, including low-level development in assembler for resource-constrained devices to high-level system design and architecture. He's currently participating in various standardization efforts within IEEE, UPnP, and XSF, working on designing standards for Internet of Things. His work on smart applications for Internet of Things and the development of the IP-TV application "Energy Saving through Smart Applications" won the Urban Living Labs global showcase award in the Cultural and Societal Participation and Collaboration Tools category. Peter Waher can be found on LinkedIn at

Pradeeka Seneviratne

Pradeeka Seneviratne is a software engineer with over 10 years of experience in computer programming and systems designing. He loves programming embedded systems such as Arduino and Raspberry Pi. Pradeeka started learning about electronics when he was at primary college by reading and testing various electronic projects found in newspapers, magazines, and books.

Pradeeka is currently a full-time software engineer who works with highly scalable technologies. Previously, he worked as a software engineer for several IT infrastructure and technology servicing companies, and he was also a teacher for information technology and Arduino development.

He researches how to make Arduino-based unmanned aerial vehicles and Raspberry Pi-based security cameras.

Brian Russell

Brian Russell is a chief engineer focused on cyber security solutions for Leidos ( He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers, with a focus on securing Internet of Things (IoT). Brian leads efforts that include security engineering for Unmanned Aircraft Systems (UAS) and connected vehicles and development security systems, including high assurance cryptographic key management systems. He has 16 years of information security experience. He serves as chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, and as a member of the Federal Communications Commission (FCC) Technological Advisory Council (TAC) Cybersecurity Working Group. Brian also volunteers in support of the Center for Internet Security (CIS) 20 Critical Security Controls Editorial Panel and the Securing Smart Cities (SSC) Initiative (

Join the Cloud Security Alliance (CSA) IoT WG @

You can contact Brian at

Drew Van Duren

Drew Van Duren currently works at Leidos as a senior cryptographic and cybersecurity engineer, highlighting 15 years of support to commercial, US Department of Defense, and US Department of Transportation (USDOT) customers in their efforts to secure vital transportation and national security systems. Originally an aerospace engineer, his experience evolved into cyber-physical (transportation system) risk management, secure cryptographic communications engineering, and secure network protocol design for high assurance DoD systems. Drew has provided extensive security expertise to the Federal Aviation Administration's Unmanned Aircraft Systems (UAS) integration office and supported RTCA standards body in the development of cryptographic protections for unmanned aircraft flying in the US National Airspace System. He has additionally supported USDOT Federal Highway Administration (FHWA) and the automotive industry in threat modeling and security analysis of connected vehicle communications design, security systems, surface transportation systems, and cryptographic credentialing operations via the connected vehicle security credential management system (SCMS). Prior to his work in the transportation industry, Drew was a technical director, managing two of the largest (FIPS 140-2) cryptographic testing laboratories and frequently provided cryptographic key management and protocol expertise to various national security programs. He is a licensed pilot and flies drone systems commercially, and is also a co-founder of Responsible Robotics, LLC, which is dedicated to safe and responsible flight operations for unmanned aircraft.

You can reach Drew at

Table of Contents

Chapter 1: Preparing our IoT Projects
Chapter 2: The HTTP Protocol
Chapter 3: The UPnP Protocol
Chapter 4: The CoAP Protocol
Chapter 5: The MQTT Protocol
Chapter 6: The XMPP Protocol
Chapter 7: Using an IoT Service Platform
Chapter 8: Creating Protocol Gateways
Chapter 9: Security and Interoperability
Chapter 10: Internet-Controlled PowerSwitch
Chapter 11: Wi-Fi Signal Strength Reader and Haptic Feedback
Chapter 12: Internet-Connected Smart Water Meter
Chapter 13: Arduino Security Camera with Motion Detection
Chapter 14: Solar Panel Voltage Logging with NearBus Cloud Connector and Xively
Chapter 15: GPS Location Tracker with Temboo, Twilio, and Google Maps
Chapter 16: Tweet-a-Light – Twitter-Enabled Electric Light
Chapter 17: Controlling Infrared Devices Using IR Remote
Chapter 18: A Brave New World
Chapter 19: Vulnerabilities, Attacks, and Countermeasures
Chapter 20: Security Engineering for IoT Development
Chapter 21: The IoT Security Lifecycle
Chapter 22: Cryptographic Fundamentals for IoT Security Engineering
Chapter 23: Identity and Access Management Solutions for the IoT
Chapter 24: Mitigating IoT Privacy Concerns
Chapter 25: Setting Up a Compliance Monitoring Program for the IoT
Chapter 26: Cloud Security for the IoT
Chapter 27: IoT Incident Response


Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar



Mesta na Internetu koja obavezno morate da posetite

Mesta na Internetu koja obavezno morate da posetite

Popust cena:
440.00 rsd

Ajax - trikovi

Ajax - trikovi

Popust cena:
1590.00 rsd

Veze, linkovi
Linkedin Twitter Facebook
© Sva prava pridržana, Kompjuter biblioteka, Beograd, Obalskih radnika 4a, Telefon: +381 11 252 0 272