Index
A
- access control list (ACL) / IEEE 802.15.4 security, Zigbee security
- Access Stratums (AS) / 4G-LTE E-UTRAN protocol stack
- acknowledged messages / Bluetooth mesh addressing modes
- Adaptive Data Rate (ADR) / LoRa physical layer
- Adaptive Frequency Hopping (AFH) / Bluetooth 5 PHY and interference
- Adaptive Multi-Rate (AMR) / 4G-LTE topology and architecture
- Additive White Gaussian Noise (AWGN) / Bitrate limits and the Shannon-Hartley theorem
- Address Space Layout Randomization / Processor and memory space
- Ad Hoc On-Demand Distance Vector (AODV) / Bluetooth mesh topology
- Advanced Encryption Standard (AES) / WPAN with IP – Thread, Symmetric cryptography
- Advanced Wireless Service (AWS) / 4G-LTE spectrum allocation and bands
- agricultural and environmental
- about / Agricultural and environmental
- use cases / Agricultural and environmental IoT use cases
- alarm system
- building / Building a basic alarm system
- Amazon Web Services (AWS) / Amazon Web Services IoT
- Analog to Digital Converters (ADC) / IEEE 802.11 modulation and encoding techniques
- analytics / Part 4 – Fog and edge compute, analytics, and machine learning
- application layer (APS) / Zigbee protocol stack
- architect / Role of an architect
- ARM TrustZone / Root of Trust
- asymmetric cryptography / Asymmetric cryptography
- AWS SDK
- about / AWS SDK for JavaScript
- URL / AWS SDK for JavaScript
B
- Basic Rate (BR) / Bluetooth 5 communication process and topologies
- Beacon Interval (BO) / IEEE 802.15.4 architecture
- bearers / 4G-LTE topology and architecture
- Beckstrom's law / The value of a network and Metcalfe's and Beckstrom's law
- Binary Frequency Shift Keying (BPSK) / IEEE 802.11 modulation and encoding techniques
- Bitcoin / Bitcoin (blockchain-based)
- Bit Error Rate (BER) / Bit error rate, IEEE 802.11 modulation and encoding techniques
- Bitrate limits / Bitrate limits and the Shannon-Hartley theorem
- BL5 nodes, features
- relay / Bluetooth mesh topology
- proxy / Bluetooth mesh topology
- low power / Bluetooth mesh topology
- friend / Bluetooth mesh topology
- blockchains
- about / Blockchains and cryptocurrencies in IoT
- use cases / Blockchains and cryptocurrencies in IoT
- bitcoin / Bitcoin (blockchain-based)
- digitally signed transaction / Bitcoin (blockchain-based)
- Unique identification / Bitcoin (blockchain-based)
- security through peer validation / Bitcoin (blockchain-based)
- Proof of Work Burden / Bitcoin (blockchain-based)
- Bitcoin Mining Incentives / Bitcoin (blockchain-based)
- security, through chaining order / Bitcoin (blockchain-based)
- Blue Dot
- about / Project overview, Introducing Blue Dot
- bluedot library, installing / Installing the bluedot library on the Raspberry Pi
- paring, with Raspberry Pi / Pairing Blue Dot with your Raspberry Pi
- Bluetooth
- about / Bluetooth
- history / Bluetooth history
- Bluetooth 5 communication process / Bluetooth 5 communication process and topologies
- Bluetooth 5 communication topologies / Bluetooth 5 communication process and topologies
- Bluetooth 5 stack / Bluetooth 5 stack
- Low Energy (LE) mode / Bluetooth 5 stack
- Basic Rate/Enhanced Data Rate mode (BR/EDR) / Bluetooth 5 stack
- Alternative MAC/PHY (AMP) / Bluetooth 5 stack
- core architectural blocks / Bluetooth 5 stack
- Bluetooth 5 PHY / Bluetooth 5 PHY and interference
- interference / Bluetooth 5 PHY and interference
- packet structure / Bluetooth packet structure
- BR/EDR operation / BR/EDR operation
- BLE operation / BLE operation
- profiles / Bluetooth profiles
- BR/EDR security / BR/EDR security
- BLE security / BLE security
- beaconing / Beaconing
- Bluetooth 5 range / Bluetooth 5 range and speed enhancement
- speed enhancement / Bluetooth 5 range and speed enhancement
- Bluetooth mesh / Bluetooth mesh introduction
- Bluetooth 5.0 mesh topology / Bluetooth mesh topology
- Bluetooth 5.0 mesh addressing modes / Bluetooth mesh addressing modes
- Bluetooth 5.0 mesh provisioning / Bluetooth mesh provisioning
- Bluetooth, AMP-specific stack
- AMP (PHY) / Bluetooth 5 stack
- AMP MAC / Bluetooth 5 stack
- AMP PAL / Bluetooth 5 stack
- AMP manager / Bluetooth 5 stack
- Bluetooth, controller level
- BR/EDR PHY (controller block) / Bluetooth 5 stack
- LE PHY / Bluetooth 5 stack
- link controller / Bluetooth 5 stack
- Baseband resource manager / Bluetooth 5 stack
- link manager / Bluetooth 5 stack
- device manager / Bluetooth 5 stack
- Host Controller Interface (HCI) / Bluetooth 5 stack
- Bluetooth, core architectural blocks
- controller level / Bluetooth 5 stack
- host level / Bluetooth 5 stack
- AMP-specific stack / Bluetooth 5 stack
- Bluetooth, host level
- L2CAP / Bluetooth 5 stack
- channel manager / Bluetooth 5 stack
- resource manager / Bluetooth 5 stack
- Security Manager Protocol (SMP) / Bluetooth 5 stack
- Service Discovery Protocol (SDP) / Bluetooth 5 stack
- audio / Bluetooth 5 stack
- RFCOMM / Bluetooth 5 stack
- Attribute protocol (ATT) / Bluetooth 5 stack
- Generic Attribute Profile (GATT) / Bluetooth 5 stack
- Generic Access Profile (GAP) / Bluetooth 5 stack
- bluetooth-enabled doorbell
- project, overview / Project overview
- requisites / Getting started, Getting started
- button state, reading with Bluetooth and Python / Reading our button state using Bluetooth and Python
- button information, reading with Python / Reading button information using Python
- creating / Creating a Bluetooth doorbell
- secret Bluetooth doorbell, creating / Creating a secret Bluetooth doorbell
- enhancing / Project overview
- text message, sending when someone is at door / Sending a text message when someone is at the door
- bluetooth-enabled doorbell, circuit
- wiring up / Wiring up our circuit
- RGB LED / What is an RGB LED?
- RGB LED, testing / Testing our RGB LED
- completing / Completing our doorbell circuit
- Bluetooth 5.0 mesh addressing modes
- Unicast addressing / Bluetooth mesh addressing modes
- group addressing / Bluetooth mesh addressing modes
- virtual addressing / Bluetooth mesh addressing modes
- Bluetooth 5.0 mesh topology
- nodes / Bluetooth mesh topology
- unprovisioned devices / Bluetooth mesh topology
- elements / Bluetooth mesh topology
- mesh gateway / Bluetooth mesh topology
- Bluetooth BLE 4.2
- Numeric comparison / BLE security
- passkey entry / BLE security
- Just Works / BLE security
- Out-of-band (OOB) / BLE security
- Bluetooth Low Energy (BLE)
- about / RF interference, Bluetooth history
- random static / BLE security
- random private resolvable / BLE security
- random private non-resolvable / BLE security
- Bluetooth SIG
- URL / Bluetooth profiles
- Border Gateway Protocol (BGP) / Routing
- button
- state, reading / Reading the state of a button
- using, with GPIO Zero / Using GPIO Zero with a button
C
- Carrier Sense Multiple Access Collision Avoidance (CSMA/CA) / IEEE 802.15.4 architecture
- CBC, with Message Authentication Code (CBC-MAC) / Symmetric cryptography
- cellular connectivity
- about / Cellular connectivity
- standards / Governance models and standards
- governance models / Governance models and standards
- cellular access technologies / Cellular access technologies
- 3GPP user equipment categories / 3GPP user equipment categories
- 4G-LTE spectrum allocation / 4G-LTE spectrum allocation and bands
- 4G-LTE spectrum bands / 4G-LTE spectrum allocation and bands
- 4G-LTE architecture / 4G-LTE topology and architecture
- 4G-LTE topology / 4G-LTE topology and architecture
- 4G-LTE E-UTRAN protocol stack / 4G-LTE E-UTRAN protocol stack
- 4G-LTE geographical areas / 4G-LTE geographical areas, dataflow, and handover procedures
- handover procedures / 4G-LTE geographical areas, dataflow, and handover procedures
- dataflow / 4G-LTE geographical areas, dataflow, and handover procedures
- 4G-LTE packet structure / 4G-LTE packet structure
- LTE Cat-0 / Cat 0, Cat 1, Cat M1, and NB-IoT, LTE Cat-0
- LTE Cat-1 / LTE Cat-1
- LTE Cat-M1 (eMTC) / LTE Cat-M1 (eMTC)
- LTE Cat-NB / LTE Cat-NB
- 5G / 5G
- Cellular Internet of Things (CIoT) / LTE Cat-NB
- Certificate Authorities (CA) / Public Key Infrastructure
- Chain Reaction / Chain Reaction
- Channel Selection Algorithm 2 (CSA2) / Bluetooth 5 PHY and interference
- charge-coupled devices (CCD) / Vision system
- CherryPy
- overview / Project overview
- about / Introducing CherryPy – a minimalist Python web framework, What is CherryPy?
- installing / Installing CherryPy
- used, for creating web page / Creating a simple web page using CherryPy
- used, for creating home security dashboards / Creating our dashboard using CherryPy, Creating our dashboard using CherryPy
- Chirp Spread Spectrum (CSS) / LoRa physical layer
- Cipher Block Chaining (CBC) / Symmetric cryptography
- Cipher Feedback Chaining (CFB) / Symmetric cryptography
- circuit
- setting up / Setting up the circuit
- fritzing process / Fritzing
- building / Building our circuit
- clear channel assessment (CCA) / IEEE 802.15.4 architecture
- cloud
- sensory data, publishing / Publishing robot car sensory data to the cloud
- cloud-based MQTT Broker
- cloud-based services
- sensory data, publishing / Publishing sensory data to cloud-based services
- cloud services
- using, for IoT / Cloud services for IoT
- Amazon Web Services IoT / Amazon Web Services IoT
- IBM Watson platform / IBM Watson platform
- Google Cloud platform / Google Cloud platform
- Microsoft Azure / Microsoft Azure
- Weather Underground / Weather Underground
- connecting, with JavaScript / Connecting to cloud services using JavaScript
- CloudMQTT account, setting up / Setting up a CloudMQTT account
- MQTT Broker instance, setting up / Setting up an MQTT Broker instance
- JavaScript client code, writing / Writing the JavaScript client code
- code, executing / Running the code
- JavaScript code / Understanding the JavaScript code
- MQTT messages, publishing from Raspberry Pi / Publishing MQTT messages from our Raspberry Pi
- Code Division Multiple Access (CDMA) / Cellular access technologies
- coherence bandwidth / Narrowband versus wideband communication
- cold junction compensation / Thermocouples
- command line
- servo, controlling / Control the servo through the command line
- communication theory
- about / Communication theory
- RF energy / RF energy and theoretical range
- theoretical range / RF energy and theoretical range
- RF interference / RF interference
- complementary metal-oxide (CMOS) devices / Vision system
- Constrained Application Protocol (CoAP)
- about / Thread architecture and topology
- consumer-based devices
- about / Consumer
- use cases / Consumer IoT use cases
- contention access periods (CAP) / IEEE 802.15.4 architecture
- contention free periods (CFP) / IEEE 802.15.4 architecture
- control plane / 4G-LTE E-UTRAN protocol stack
- Correlation Power Analysis (CPA) / Chain Reaction
- Counter (CTR) / Symmetric cryptography
- cryptocurrency
- cryptography
- about / Cryptography
- Symmetric cryptography / Symmetric cryptography
- asymmetric cryptography / Asymmetric cryptography
- hash / Cryptographic hash (authentication and signing)
- Public key infrastructure (PKI) / Public Key Infrastructure
- transport layer security (TLS) / Network stack – Transport Layer Security
- current sensors / Hall effect sensors and current sensors
- cybersecurity
- about / Cyber security vernacular
- attack / Attack and threat terms
- threats / Attack and threat terms
- amplification attack / Attack and threat terms
- ARP spoof / Attack and threat terms
- banner scans / Attack and threat terms
- botnets / Attack and threat terms
- Brute Force / Attack and threat terms
- Buffer Overflow / Attack and threat terms
- C2 / Attack and threat terms
- Correlation Power Analysis Attack / Attack and threat terms
- dictionary attack / Attack and threat terms
- Distributed Denial of Service (DDOS) / Attack and threat terms
- fuzzing / Attack and threat terms
- Man-in-the-Middle Attack (MITM) / Attack and threat terms
- NOP sleds / Attack and threat terms
- Replay Attack (also known as a Playback Attack) / Attack and threat terms
- RCE Exploit / Attack and threat terms
- Return-Orientated Programming (ROP Attack) / Attack and threat terms
- Return-to-libc / Attack and threat terms
- rootkit / Attack and threat terms
- side channel attack / Attack and threat terms
- spoofing / Attack and threat terms
- SYN Flood / Attack and threat terms
- Zero-Day Exploits / Attack and threat terms
- defense / Defense terms
- cybersecurity, defense mechanisms
- Address Space Layout Randomization / Defense terms
- Blackhole (sinkhole) / Defense terms
- Data Execution Prevention / Defense terms
- Deep Packet Inspection (DPI) / Defense terms
- firewall / Defense terms
- guard bands / Defense terms
- non-executable memory / Defense terms
- honeypots / Defense terms
- Instruction-Based Memory Access Control / Defense terms
- Intrusion Detection System / Defense terms
- Intrusion Prevention System / Defense terms
- milkers / Defense terms
- port scanning / Defense terms
- Public Key Infrastructure (PKI) / Defense terms
- public key / Defense terms
- private key / Defense terms
- root of trust / Defense terms
- secure boot / Defense terms
- stack canaries / Defense terms
- trusted execution environment / Defense terms
D
- data communication / Part 2 – Data communication
- Datagram Transport Layer Security (DTLS) / 6LoWPAN security, Network stack – Transport Layer Security
- DC motors / DC motors
- decibel (dB) / RF energy and theoretical range
- Dedicated Short Range Communication (DSRC) / IEEE 802.11p vehicle-to-vehicle
- Defense Information Systems Agency (DISA) / Software-Defined Perimeter architecture
- demilitarized zone (DMZ) / Security functions
- Device to Device (D2D) communication / 5G
- DHT11
- used, for finding temperature and humidity / Using the DHT11 to find temperature and humidity
- Differential Phase Shift Keying (DPSK) / IEEE 802.11 modulation and encoding techniques
- Differential Power Analysis (DPA) / Chain Reaction
- Differential Quaternary Phase Shift Keying (DQPSK) / Bluetooth 5 PHY and interference
- Differentiated Services (DiffServ) / Traffic shaping and QoS
- digital light processor (DLP) / MEMS sensors
- Digital to Analog Converters (DAC) / IEEE 802.11 modulation and encoding techniques
- Direct Sequence Spread Spectrum (DSSS) / IEEE 802.15.4 architecture, IEEE 802.11 spectrum allocation
- Direct Tunnel Setup (DTS) / 4G-LTE geographical areas, dataflow, and handover procedures
- Distribution System (DS) / IEEE 802.11 architecture
- Domain-based Message Authentication / Other governmental bodies
- doorbell application, with text messaging
- creating / Creating a simple doorbell application with text messaging
- secret doorbell application with text messaging, creating / Creating a secret doorbell application with text messaging
- Duplicate Address Detection (DAD) / Neighbor discovery
E
- E-UTRAM Cell Identity (ECI) / 4G-LTE geographical areas, dataflow, and handover procedures
- E-UTRAN Cell Global Identifier (ECGI) / 4G-LTE geographical areas, dataflow, and handover procedures
- Eclipse Paho JavaScript client / Eclipse Paho JavaScript client
- Eddystone
- edge compute / Part 4 – Fog and edge compute, analytics, and machine learning
- Electrical Erasable Programmable Read-Only Memory (EEPROM) / Accessing Raspberry Pi's GPIO
- Electronic Codebook (ECB) / Symmetric cryptography
- elliptical-curve Diffie-Hellman (ECDH) / BLE security
- Elliptic Curve Cryptography (ECC) / Asymmetric cryptography
- encryption
- Symmetric Key encryption / Cryptography
- Public Key encryption / Cryptography
- Cryptographic hash / Cryptography
- energy
- about / Energy
- use cases / Energy IoT use cases
- energy harvesting
- about / Energy harvesting
- solar harvesting / Solar harvesting
- piezo-mechanical harvesting / Piezo-mechanical harvesting
- RF energy harvesting / RF energy harvesting
- thermal harvesting / Thermal harvesting
- energy sources / Energy sources and power management
- energy storage
- about / Energy storage
- energy model / Energy and power models
- power model / Energy and power models
- batteries / Batteries
- supercapacitors / Supercapacitors
- radioactive power sources / Radioactive power sources
- summary / Energy storage summary and other forms of power
- power sources / Energy storage summary and other forms of power
- Enhanced Data Rate Mode (EDR) / Bluetooth history
- EPS Bearer / 4G-LTE topology and architecture
- Evolved Packet Core (EPC)
- Mobility Management Equipment (MME) / 4G-LTE topology and architecture
- Home Subscriber Server (HSS) / 4G-LTE topology and architecture
- Servicing Gateway (SGW) / 4G-LTE topology and architecture
- Public Data Network Gateway (PGW) / 4G-LTE topology and architecture
- Policy Control and Charging Rules Function (PCRF) / 4G-LTE topology and architecture
- Evolved Packet System (EPS) / LTE Cat-NB
- Extended Discontinuous Receive (eDRX) mode / LTE Cat-M1 (eMTC)
- Extended Inquiry Response (EIR) / Bluetooth history
F
- fading phenomenon
- fast fading / Narrowband versus wideband communication
- slow fading / Narrowband versus wideband communication
- Fast Fourier Transform (FFT) / IEEE 802.11 modulation and encoding techniques
- Federal Communications Commission (FCC) / Governing structure
- Field Effect Transistor (FET) / PIR sensors
- financial / Retail, financial, and marketing
- fog compute / Part 4 – Fog and edge compute, analytics, and machine learning
- forward error correction (FEC) / Bit error rate
- Frame Check Sequence (FCS) / Sigfox MAC layer
- Free Space Path Loss (FSPL) / RF energy and theoretical range
- frequency-hopping spread spectrum (FHSS) / Bluetooth 5 PHY and interference
- Frequency Division Duplex (FDD) / 4G-LTE spectrum allocation and bands
- Frequency Division Multiple Access (FDMA) / Bluetooth 5 PHY and interference , Cellular access technologies
- Frequency hopping spread spectrum (AFH) / Bluetooth history
- full end devices (FEDs) / Thread architecture and topology
- functional block, responsibilities
- analog-to-digital conversion / Vision system
- optical clamp / Vision system
- white balance / Vision system
- dead pixel correction / Vision system
- debayer filtering / Vision system
- demosaicing / Vision system
- noise reduction / Vision system
- sharpening / Vision system
- color space conversion / Vision system
- gamma correction / Vision system
- color space conversion 3 x 3 / Vision system
- chroma subsampling / Vision system
- JPEG encoder / Vision system
G
- 3GPP user equipment categories / 3GPP user equipment categories
- 4G-LTE architecture
- Evolved Universal Terrestrial Radio Access Network (E-UTRAN) / 4G-LTE topology and architecture
- eNodeB / 4G-LTE topology and architecture
- User Equipment (UE) / 4G-LTE topology and architecture
- Evolved Packet Core (EPC) / 4G-LTE topology and architecture
- Public Data Network (PDN) / 4G-LTE topology and architecture
- 4G-LTE E-UTRAN protocol stack
- about / 4G-LTE E-UTRAN protocol stack
- Physical Layer 1 / 4G-LTE E-UTRAN protocol stack
- Medium Access Control (MAC) / 4G-LTE E-UTRAN protocol stack
- Radio Link Control (RLC) / 4G-LTE E-UTRAN protocol stack
- Packet Data Convergence Control Protocol (PDCP) / 4G-LTE E-UTRAN protocol stack
- Radio Resource Control (RRC) / 4G-LTE E-UTRAN protocol stack
- Non-Access Stratum / 4G-LTE E-UTRAN protocol stack
- access Stratum / 4G-LTE E-UTRAN protocol stack
- 4G-LTE spectrum allocation / 4G-LTE spectrum allocation and bands
- 4G-LTE spectrum bands / 4G-LTE spectrum allocation and bands
- 5G
- gateway functions / Gateway functions
- GATT
- services / Bluetooth profiles
- characteristics / Bluetooth profiles
- Gaussian Frequency Shift Keying (GFSK) / Bluetooth 5 PHY and interference , IEEE 802.11 modulation and encoding techniques, Sigfox physical layer
- General Purpose Input Output (GPIO) / A brief history of the Raspberry Pi
- Global System for Mobile Communications (GSM) / Governance models and standards
- Google Cloud
- about / Google Cloud platform, Google Cloud
- services / Google Cloud platform
- URL / Google Cloud
- government and military
- about / Government and military
- use cases / Government and military IoT use cases
- GPIO, Raspberry Pi
- accessing / Accessing Raspberry Pi's GPIO
- Pibrella / Pibrella
- RPi.GPIO / RPi.GPIO
- GPIO zero / GPIO zero
- gpiozero
- used, for performing blink function on LED / Blink LED using gpiozero
- GPIO Zero button
- GPIO Zero buzzer class
- using / Using the GPIO Zero buzzer class
- GPIO zero package / GPIO zero
- GPRS Tunneling Protocol (GTP) / 4G-LTE topology and architecture
- Guard Interval (GI) / IEEE 802.11 modulation and encoding techniques
H
- Hall voltage / Hall effect sensors and current sensors
- Hardware Added on Top (HAT) / A look at operating systems for the Raspberry Pi, Accessing Raspberry Pi's GPIO, Step 1 – Adafruit 16-Channel PWM/Servo HAT for Raspberry Pi
- hardware security
- about / Physical and hardware security
- Root of Trust / Root of Trust
- key management / Key management and trusted platform modules
- trusted platform modules / Key management and trusted platform modules
- processor / Processor and memory space
- memory space / Processor and memory space
- storage security / Storage security
- physical security / Physical security
- hashing functions / Cryptographic hash (authentication and signing)
- HC-SR04 sensor / Taking a closer look at the HC-SR04
- healthcare
- about / Healthcare
- use cases / Healthcare IoT use cases
- Hello LED
- modifying, infrared sensor used / Modifying Hello LED using infrared sensor
- distance sensor, configuring / Configuring a distance sensor
- upgrading / Taking Hello LED to another level
- home security dashboard
- overview / Project overview
- creating, CherryPy used / Creating our dashboard using CherryPy, Creating our dashboard using CherryPy
- Pi camera, using / Using the Pi camera to take a photo
- sensory data, displaying / Displaying sensory data on our dashboard
- building, with temperature sensor / Home security dashboard with a temperature sensor
- 30-second refresh time code, changing / Home security dashboard with quick response
- Host Controller Interface (HCI) / Bluetooth 5 stack
- Host Identity Protocol (HIP) / VPN
- HTML5 Gamepad API
- reference / HTML5 Gamepad API
- HTML weather dashboard / HTML weather dashboard
- hyper-frames (HF) / LTE Cat-M1 (eMTC)
I
- iBeacons
- IBM Watson platform / IBM Watson platform
- Identity Resolving Key (IRK) / BLE security
- IEEE 802.11
- protocols / IEEE 802.11 protocols and WLAN
- suite of protocols / IEEE 802.11 suite of protocols and comparison
- architecture / IEEE 802.11 architecture
- infrastructure / IEEE 802.11 architecture
- ad hoc / IEEE 802.11 architecture
- distribution system / IEEE 802.11 architecture
- spectrum allocation / IEEE 802.11 spectrum allocation
- encoding techniques / IEEE 802.11 modulation and encoding techniques
- modulation / IEEE 802.11 modulation and encoding techniques
- MIMO / IEEE 802.11 MIMO
- Implicit feedback beamforming / IEEE 802.11 MIMO
- Explicit feedback beamforming / IEEE 802.11 MIMO
- packet structure / IEEE 802.11 packet structure
- operation / IEEE 802.11 operation
- security / IEEE 802.11 security
- IEEE 802.11ac / IEEE 802.11ac
- vehicle-to-vehicle / IEEE 802.11p vehicle-to-vehicle
- IEEE 802.11ah / IEEE 802.11ah
- IEEE 802.11, authentication types
- WEP / IEEE 802.11 security
- WPA / IEEE 802.11 security
- WPA-PSK / IEEE 802.11 security
- WPA2 / IEEE 802.11 security
- IEEE 802.11, encoding techniques
- Amplitude Shift Keying (ASK) / IEEE 802.11 modulation and encoding techniques
- Frequency Shift Keying (FSK) / IEEE 802.11 modulation and encoding techniques
- Phase Shift Keying (PSK) / IEEE 802.11 modulation and encoding techniques
- IEEE 802.11, interference mitigation techniques
- Frequency Hopping Spread Spectrum (FHSS) / IEEE 802.11 modulation and encoding techniques
- Direct sequence spread spectrum / IEEE 802.11 modulation and encoding techniques
- Orthogonal Frequency Divisional Multiplexing (OFDM) / IEEE 802.11 modulation and encoding techniques
- IEEE 802.11ah, power saving states
- Traffic Indication Map (TIM) / IEEE 802.11ah
- Non-TIM stations / IEEE 802.11ah
- Unscheduled stations / IEEE 802.11ah
- IEEE 802.11ah, stations
- root access point / IEEE 802.11ah
- STA / IEEE 802.11ah
- relay node / IEEE 802.11ah
- IEEE 802.15.4
- about / IEEE 802.15.4
- architecture / IEEE 802.15.4 architecture
- topology / IEEE 802.15.4 topology
- Full function device (FFD) / IEEE 802.15.4 topology
- Reduced function device (RFD) / IEEE 802.15.4 topology
- address modes / IEEE 802.15.4 address modes and packet structure
- packet structure / IEEE 802.15.4 address modes and packet structure
- start-up sequence / IEEE 802.15.4 start-up sequence
- security / IEEE 802.15.4 security
- image signal processor (ISP) / Vision system
- Independent Basic Set Service (IBSS) / IEEE 802.11 architecture
- Industrial, Scientific and Medical (ISM) devices / Governing structure
- industrial and manufacturing
- Industrial IoT (IIoT) / Industrial and manufacturing
- Information Technology (IT) / IP role in IoT
- information theory
- about / Information theory
- bitrate limits / Bitrate limits and the Shannon-Hartley theorem
- Shannon-Hartley theorem / Bitrate limits and the Shannon-Hartley theorem
- Bit error rate (BER) / Bit error rate
- narrowband communication, versus wideband communication / Narrowband versus wideband communication
- infrared motion sensor
- state, reading from / Reading the state from an infrared motion sensor
- infrared sensor
- used, for modifying Hello LED / Modifying Hello LED using infrared sensor
- Infrastructure Basic Set Service (BSS) / IEEE 802.11 architecture
- Initialization Vector (IV) / Symmetric cryptography, Cryptographic hash (authentication and signing)
- input devices / Input devices
- Integrated Development and Learning Environment (IDLE) / Integrated Development and Learning Environment
- Integrated Development Environment (IDE) / Project overview, Knowledge required to complete this chapter
- Intel Boot Guard / Root of Trust
- Inter-LTE Handover / 4G-LTE geographical areas, dataflow, and handover procedures
- Inter-symbol Interference (ISI) / IEEE 802.11 modulation and encoding techniques
- International Mobile Telecommunications-2000 (IMT-2000) / Governance models and standards
- International Mobile Telecommunications-Advanced (IMT-Advanced) / Governance models and standards
- International Telecommunication Union (ITU) / Governing structure, Governance models and standards
- Internet Key Exchange (IKE) / VPN
- Internet of Things (IoT)
- history / History of the IoT
- references / History of the IoT
- potential / IoT potential
- industrial and manufacturing / Industrial and manufacturing
- industrial and manufacturing, use cases / Industrial and manufacturing IoT use cases and impact
- industrial and manufacturing, impact / Industrial and manufacturing IoT use cases and impact
- consumer / Consumer
- consumer, use cases / Consumer IoT use cases
- retail / Retail, financial, and marketing
- financial / Retail, financial, and marketing
- marketing / Retail, financial, and marketing
- retail, use cases / Retail IoT use cases
- healthcare / Healthcare
- health care, use cases / Healthcare IoT use cases
- transportation and logistics / Transportation and logistics
- transportation and logistics, use cases / Transportation and logistics IoT use cases
- agricultural and environmental / Agricultural and environmental
- agricultural and environmental, use cases / Agricultural and environmental IoT use cases
- energy / Energy
- energy, use cases / Energy IoT use cases
- smart city / Smart city
- smart city, use cases / Smart city IoT use cases
- government and military / Government and military
- government and military, use cases / Government and military IoT use cases
- versus machine ot machine / IoT versus machine to machine
- Internet protocol (IP)
- about / Internet protocol and transmission control protocol
- using, in IoT / IP role in IoT
- ubiquity / IP role in IoT
- standards-based / IP role in IoT
- scalability / IP role in IoT
- reliability / IP role in IoT
- manageability / IP role in IoT
- internet routing / Part 3 – Internet routing and protocols
- Intra-LTE Handover / 4G-LTE geographical areas, dataflow, and handover procedures
- IoT, roles
- sensors / IoT ecosystem
- sensor communication systems / IoT ecosystem
- local area networks / IoT ecosystem
- aggregators / IoT ecosystem
- routers / IoT ecosystem
- gateways / IoT ecosystem
- WAN / IoT ecosystem
- cloud / IoT ecosystem
- data analytics / IoT ecosystem
- security / IoT ecosystem
- IOTA
- IoT analog weather dashboard
- overview / Project overview
- requisites / Getting started
- enhancing / Enhancing our project
- graphic, printing / Printing out the main graphic
- LED, adding / Adding the needle and LED
- needle, adding / Adding the needle and LED
- IoT architecture / IoT architecture
- IoT cyber attacks
- anatomy / Anatomy of IoT cyber attacks
- Mirai / Mirai
- Stuxnet / Stuxnet
- attack spread / Stuxnet
- Chain Reaction / Chain Reaction
- IoT endpoints
- about / Smart IoT endpoints
- vision system / Vision system
- IoT security, best practices
- about / IoT security best practices
- holistic security / Holistic security
- checklist / Security checklist
J
- JavaScript
- used, for connecting to cloud services / Connecting to cloud services using JavaScript
- JavaScript client
- code, writing / Writing the JavaScript client code
- building, for Raspberry Pi connection / Building a JavaScript client to connect to our Raspberry Pi
- used, for accessing robot car's sensory data / Creating a JavaScript client to access our robot car's sensory data
- enhancing, for controlling robot car / Enhancing our JavaScript client to control our robot car
- Nipple.js / Nipple.js
- HTML5 Gamepad API / HTML5 Gamepad API
- Johnny-Five / Johnny-Five
- JavaScript client, building
- HTML code, writing / Writing the HTML code
- JavaScript code, writing for communication with MQTT Broker / Writing the JavaScript code to communicate with our MQTT Broker
- JavaScript cloud libraries
- about / Introducing JavaScript cloud libraries
- Google Cloud / Google Cloud
- AWS SDK / AWS SDK for JavaScript
- Eclipse Paho JavaScript client / Eclipse Paho JavaScript client
- Johnny-Five
- reference / Johnny-Five
- Just Works / BR/EDR security
K
- key derivation function (KDF) / Cryptography
- Key Management Protocol (KMP) / 802.15 standards
L
- 6LoWPAN
- about / WPAN with IP – 6LoWPAN
- topology / 6LoWPAN topology
- router nodes / 6LoWPAN topology
- host nodes / 6LoWPAN topology
- edge routers / 6LoWPAN topology
- protocol stack / 6LoWPAN protocol stack
- mesh addressing / Mesh addressing and routing
- routing / Mesh addressing and routing
- mesh-under network / Mesh addressing and routing
- route-over network / Mesh addressing and routing
- header compression / Header compression and fragmentation
- fragmentation / Header compression and fragmentation
- Neighbor discovery / Neighbor discovery
- security / 6LoWPAN security
- LED
- creating / Hello LED
- toggling, with long button press / Toggling an LED with a long button press
- Licensed-Assisted Access (LAA) / 4G-LTE spectrum allocation and bands
- light-out management (LOM) / Failover and out-of-band management
- Linear Time Invariant (LTI) / LoRaWAN summary
- listen-before-talk (LBT) / 4G-LTE spectrum allocation and bands
- Long-Term Evolution (LTE) / Governance models and standards
- long-term key (LTK) / BLE security
- look-up table (LUT) / Vision system
- LoRa
- about / LoRa and LoRaWAN
- physical layer / LoRa physical layer
- LoRaWAN
- about / LoRa and LoRaWAN
- MAC layer / LoRaWAN MAC layer
- topology / LoRaWAN topology
- summary / LoRaWAN summary
- Low Energy (LE) / Bluetooth history, Bluetooth 5 communication process and topologies
- low power node (LPN) / Bluetooth mesh topology
- Low Power Wide Area Networks (LPWAN) / Cat 0, Cat 1, Cat M1, and NB-IoT
- LTE
- resource element / 4G-LTE spectrum allocation and bands
- Subcarrier spacing / 4G-LTE spectrum allocation and bands
- cyclic prefix / 4G-LTE spectrum allocation and bands
- time slot / 4G-LTE spectrum allocation and bands
- resource block / 4G-LTE spectrum allocation and bands
- LTE Unlicensed (LTE-U) / 4G-LTE spectrum allocation and bands
M
- machine-to-machine (M2M) communication / IoT versus machine to machine, Bluetooth 5 communication process and topologies
- machine learning
- Man-in-the-Middle attacks (MITM) / BR/EDR security
- marketing / Retail, financial, and marketing
- Massive-MIMO (M-MIMO) / 5G
- master (M) / Bluetooth 5 communication process and topologies
- Maximum Coupling Loss (MCL) / Bit error rate, LTE Cat-NB
- Maximum Transmission Unit (MTU) / Header compression and fragmentation
- Mean Opinion Score (MOS) / Traffic shaping and QoS
- Media Access Controller (MAC) / IEEE 802.11 protocols and WLAN
- Medium Access Controller (MAC) / Thread architecture and topology
- mesh-specific layers
- Models / Bluetooth mesh introduction
- foundation models / Bluetooth mesh introduction
- access layer / Bluetooth mesh introduction
- upper transport layer / Bluetooth mesh introduction
- lower transport layer / Bluetooth mesh introduction
- network layer / Bluetooth mesh introduction
- bearer layer / Bluetooth mesh introduction
- BLE / Bluetooth mesh introduction
- Mesh link establishment (MLE) / Thread routing
- message authentication codes (MAC) / Cryptography
- Message Querying Telemetry Transport (MQTT) / Controlling the green LED on T.A.R.A.S
- Metcalfe's law / The value of a network and Metcalfe's and Beckstrom's law
- Micro-electromechanical systems (MEMS)
- about / IoT ecosystem, MEMS sensors
- accelerometers / MEMS accelerometers and gyroscopes
- gyroscopes / MEMS accelerometers and gyroscopes
- microphones / MEMS microphones
- pressure sensors / MEMS pressure sensors
- Microsoft Azure / Microsoft Azure
- millimeter waves (mmWave) / 5G
- MIMO
- about / IEEE 802.11 MIMO
- spatial diversity / IEEE 802.11 MIMO
- spatial multiplexing / IEEE 802.11 MIMO
- minimal end devices (MEDs) / Thread architecture and topology
- Mirai
- Mobile Terminations (MT) / 4G-LTE topology and architecture
- Mobile wireless service (MWS) / Bluetooth history
- Modulation and Coding Scheme (MCS) / IEEE 802.11 modulation and encoding techniques
- more data (MD) / Bluetooth mesh topology
- Mosquitto platform
- MQTT Broker instance
- setting up / Setting up an MQTT Broker instance
- MQTT messages
- publishing, from Raspberry Pi / Publishing MQTT messages from our Raspberry Pi
- Multicast Protocol for Low Power and Lossy Networks (MPL) / Thread routing
- multiple input, multiple output (MIMO) / Bitrate limits and the Shannon-Hartley theorem
N
- narrowband communication
- versus wideband communication / Narrowband versus wideband communication
- National Telecommunications and Information Administration (NTIA)
- about / Governing structure
- Neighbor Confirmation (NC) / Neighbor discovery
- Neighbor discovery (ND) / Neighbor discovery, Neighbor discovery
- Neighbor Registration (NR) / Neighbor discovery
- Network Discovery (ND) / 6LoWPAN topology
- Network Function Virtualization (NFV) / Software-Defined Networking
- network layer (NWK) / Zigbee protocol stack
- Nipple.js
- reference / Nipple.js
- NIST Special Publication
- nodes / Bitcoin (blockchain-based)
- Non-Access Stratum (NAS) / 4G-LTE topology and architecture, 4G-LTE E-UTRAN protocol stack
- Non-Execution or Executable Space Protection / Processor and memory space
- non-standalone (NSA) / 5G
- numeric comparison / BR/EDR security
O
- Object Oriented Programming (OOP) / Knowledge required to complete this chapter
- on-board unit (OBU) / IEEE 802.11p vehicle-to-vehicle
- Open Shortest Path First (OSPF) / Routing
- Operational Technology (OT) / IP role in IoT
- Organization Unique Identifier (OUI) / Bluetooth packet structure
- Orthoganol Sequence Spread Spectrum (OSSS) / Sigfox physical layer
- Orthogonal Frequency Divisional Multiplexing (OFDM) / IEEE 802.11 spectrum allocation
- Out-of-band (OOB) / BR/EDR security
- Out-of-Band Management (OOBM) / Failover and out-of-band management
- output devices / Output devices
- Output Feedback Chaining (OFB) / Symmetric cryptography
- Over-the-Air-Activation (OTAA) / LoRaWAN MAC layer
P
- parked (P) / Bluetooth 5 communication process and topologies
- passkey entry / BR/EDR security
- Peer Aware Communications (PAC) / 802.15 standards
- Performance Enhancing Proxies (PEP) / Traffic shaping and QoS
- Periodic Restricted Access Windows (PRAW) / IEEE 802.11ah
- Personal Area Networks (PAN) / Part 2 – Data communication
- Personal Identification Number (PIN) / BR/EDR security
- photoelectric sensors / Photoelectric sensors
- physical security / Physical security
- Pi-specific libraries
- exploring / Project overview
- Pibrella / Pibrella
- Pi camera
- used, for clicking pictures / Using the Pi camera to take a photo
- piconet / Bluetooth 5 communication process and topologies
- piezo-mechanical harvesting / Piezo-mechanical harvesting
- PIR sensor / What is a PIR sensor?
- power / Part 1 – Sensing and power
- power efficiency / Bitrate limits and the Shannon-Hartley theorem
- Power Limited region / Bitrate limits and the Shannon-Hartley theorem
- power management / Power management
- Power Save Mode (PSM) / LTE Cat-0
- protocol
- pseudo-random number generator (PRNG) / Asymmetric cryptography
- Public Key Infrastructure (PKI) / Public Key Infrastructure
- Public Land Mobile Network (PLMN) / 4G-LTE topology and architecture
- pulse density modulated (PDM) / MEMS microphones
- pulse width modulation (PWM) / Servo motors
- Pyroelectric Infrared (PIR) sensors / PIR sensors
- Python
- used, for reading sensory data / Reading robot car sensory data with Python
- Python command line
- using / Using the Python command line
- Python libraries, Raspberry Pi
- about / Python libraries for the Raspberry Pi
- picamera / picamera
- pillow / Pillow
- sense-hat / sense-hat and sense-emu
- sense-emu / sense-hat and sense-emu
- Python program
- writing / Writing a simple Python program
- class, creating / Creating the class
- object, creating / Creating the object
- object inspector, using / Using the object inspector
- class, testing / Testing your class
- flexible code, creating / Making the code flexible
- flexible code, example / Example one
- used, for pulling data from cloud / A basic Python program to pull data from the cloud
- web service, accessing / Accessing the web service
- Sense HAT Emulator, using / Using the Sense HAT Emulator
- writing, to control servo / Write a Python program to control the servo
- used, for controlling robot car through cloud / Using a Python program to control a robot car through the cloud
- python tools
- using, for Raspberry Pi / Python tools for Raspberry Pi
- Terminal, using / The Terminal
- integrated development and learning environment / Integrated Development and Learning Environment
- Thonny / Thonny
Q
- Quadrature Amplitude Modulation (QAM) / IEEE 802.11 modulation and encoding techniques
- Quality of Service (QoS) / 4G-LTE topology and architecture, Traffic shaping and QoS
R
- Radio Access Networks (RANs) / 4G-LTE topology and architecture
- radioactive power sources / Radioactive power sources
- Radiocommunication Sector (ITU-R) / Governance models and standards
- Radio Resource Control (RRC) / 4G-LTE E-UTRAN protocol stack
- radio spectrum
- about / The radio spectrum
- governing structure / Governing structure
- Random Frequency and Time Division Multiple Access (RFTDMA) / Sigfox physical layer
- Raspberry Pi
- history / A brief history of the Raspberry Pi
- operating systems, overview / A look at operating systems for the Raspberry Pi
- Volumio / A look at operating systems for the Raspberry Pi
- PiFM radio transmitter / A look at operating systems for the Raspberry Pi
- Stratux / A look at operating systems for the Raspberry Pi
- RetroPie / A look at operating systems for the Raspberry Pi
- OctoPi / A look at operating systems for the Raspberry Pi
- NOOBS / A look at operating systems for the Raspberry Pi
- project overview / Project overview
- python tools, using / Python tools for Raspberry Pi
- Python libraries / Python libraries for the Raspberry Pi
- GPIO, accessing / Accessing Raspberry Pi's GPIO
- servo motor, wiring up / Wiring up a servo motor to the Raspberry Pi
- stepper motors / Stepper motors
- DC motors / DC motors
- servo motors / Servo motors
- servo motor, connecting / Connecting the servo motor to our Raspberry Pi
- Twilio, installing / Installing Twilio on our Raspberry Pi
- Blue Dot, pairing with / Pairing Blue Dot with your Raspberry Pi
- MQTT messages, publishing / Publishing MQTT messages from our Raspberry Pi
- Raspbian OS
- installing / Installing the Raspbian OS
- microSD card, formatting / Formatting a microSD card for Raspbian
- NOOBS files, copying to microSD RAM / Copying the NOOBS files to the microSD RAM
- installer, executing / Running the installer
- overview / A quick overview of the Raspbian OS
- Chromium web browser / The Chromium web browser
- home folder / The home folder
- terminal / The Terminal
- Mathematica / Mathematica
- Sonic Pi / Sonic Pi
- scratch / Scratch and Scratch 2.0
- scratch 2.0 / Scratch and Scratch 2.0
- LibreOffice / LibreOffice
- Received Signal Strength Indicator (RSSI) / Bluetooth history
- Registration Authority (RA) / Public Key Infrastructure
- Reporting / Other governmental bodies
- Resistance Temperature Detectors (RTD) / Resistance Temperature Detectors
- Restricted Access Window (RAW) / IEEE 802.11ah
- retail
- about / Retail, financial, and marketing
- use cases / Retail IoT use cases
- RF energy harvesting / RF energy harvesting
- RGB LED
- about / What is an RGB LED?
- testing / Testing our RGB LED
- RIPng / Routing
- road-side unit (RSU) / IEEE 802.11p vehicle-to-vehicle
- robot car
- parts / The parts of the robot car
- building / Building the robot car
- Adafruit 16-Channel PWM/Servo HAT, creating for Raspberry Pi / Step 1 – Adafruit 16-Channel PWM/Servo HAT for Raspberry Pi
- motors, writing up / Step 2 – Wiring up the motors, Step 7 – Wiring up the motors
- servo camera mount, assembling / Step 3 – Assembling the servo camera mount
- head, attaching / Step 4 – Attaching the head
- DC motor plate, assembling / Step 5 – Assembling the DC motor plate
- motors, attaching / Step 6 – Attaching the motors and wheels
- wheels. attaching / Step 6 – Attaching the motors and wheels
- camera mount, attaching / Step 8 – Attaching the camera mount, Raspberry Pi, and Adafruit servo board
- Raspberry Pi, attaching / Step 8 – Attaching the camera mount, Raspberry Pi, and Adafruit servo board
- Adafruit servo board, attaching / Step 8 – Attaching the camera mount, Raspberry Pi, and Adafruit servo board
- buzzer, dividing / Step 9 – Attaching the buzzer and voltage divider
- voltage divider, attaching / Step 9 – Attaching the buzzer and voltage divider
- T.A.R.A.S, wiring up / Step 10 – Wiring up T.A.R.A.S
- controlling / Learning how to control the robot car
- Raspberry Pi, configuring / Configuring our Raspberry Pi
- Python library, for Adafruit Servo HAT / Python library for Adafruit Servo HAT
- sensor, identifying / Identifying the sensor on the robot car
- sensory data, reading with Python / Reading robot car sensory data with Python
- sensory data, publishing to cloud / Publishing robot car sensory data to the cloud
- data, reading from cloud / Reading the robot car's data from the cloud
- distance gauge look, modifying / Changing the look of the distance gauge
- distance gauge range, modifying / Changing the range on the distance gauge
- dashboard, viewing outside account / Viewing the dashboard outside of your account
- controlling, with Python program through cloud / Using a Python program to control a robot car through the cloud
- switch, adding to dashboard / Adding a switch to our dashboard
- green LED, controlling on T.A.R.A.S / Controlling the green LED on T.A.R.A.S
- internet, used for creating T.A.R.A.S dance / Using the internet to make T.A.R.A.S dance
- robot car Python code
- modifying / Modifying the robot car Python code
- wheels, moving / Move the wheels
- head, moving / Move the head
- sound, creating / Make sounds
- enhancing / Enhancing the code
- integrating / Stitching our code together
- Root of Trust (RoT) / Root of Trust
- Router-eligible End Devices (REED) / Thread architecture and topology
- Router Advertisement (RA) / Neighbor discovery
- Router Solicitation (RS) / Neighbor discovery
- routing
- routing functions
- about / Routing functions
- gateway functions / Gateway functions
- routing / Routing
- failover / Failover and out-of-band management
- Out-of-Band Management / Failover and out-of-band management
- VLAN / VLAN
- VPN / VPN
- traffic shaping / Traffic shaping and QoS
- QoS / Traffic shaping and QoS
- security functions / Security functions
- metrics / Metrics and analytics
- analytics / Metrics and analytics
- edge processing / Edge processing
- RPi.GPIO package / RPi.GPIO
S
- 802.15 standards / 802.15 standards
- scan mechanisms
- passive scanning / IEEE 802.11 operation
- active scanning / IEEE 802.11 operation
- scatternet / Bluetooth 5 communication process and topologies
- Secure Simple Pairing (SSP) / Bluetooth history
- security / Part 5 – Threat and security in IoT
- Seebeck electromotive effect / Thermocouples
- segmentation and reassembly (SAR) / Bluetooth mesh introduction
- Sense HAT emulator
- sensing / Part 1 – Sensing and power
- sensing devices
- about / Sensing devices
- thermocouples / Thermocouples and temperature sensing
- temperature sensing / Thermocouples and temperature sensing
- hall effect sensors / Hall effect sensors and current sensors
- current sensors / Hall effect sensors and current sensors
- photoelectric sensors / Photoelectric sensors
- PIR sensors / PIR sensors
- LiDAR / LiDAR and active sensing systems
- MEMS sensors / MEMS sensors
- sensor
- identifying, on robot car / Identifying the sensor on the robot car
- sensor fusion
- about / Sensor fusion
- centralized / Sensor fusion
- de-centralized / Sensor fusion
- sensors
- implementing / Functional examples (putting it all together)
- TI sensorTag CC2650 / Functional example – TI SensorTag CC2650
- controller, using / Sensor to controller
- sensory data
- displaying, on home security dashboard / Displaying sensory data on our dashboard
- publishing, to cloud-based services / Publishing sensory data to cloud-based services
- publishing, with MQTT library installation / Install the MQTT library
- reading / Reading sensory data and publishing to ThingsBoard
- publishing, to ThingsBoard / Reading sensory data and publishing to ThingsBoard
- sensory data, robot car
- JavaScript client, used for accessing / Creating a JavaScript client to access our robot car's sensory data
- code, writing for T.A.R.A.S / Writing the code for T.A.R.A.S
- video, livestreaming from T.A.R.A.S / Livestreaming videos from T.A.R.A.S
- Service Access Points (SAP) / IEEE 802.15.4 architecture
- Service Set Identifier (SSID) / Neighbor discovery
- servo
- controlling, with weather data / Controlling the servo using weather data
- range, correcting / Correcting for servo range
- position, modifying based on weather data / Changing the position of the servo based on weather data
- Session Initiation Protocol (SIP) / 4G-LTE topology and architecture
- Shannon-Hartley theorem / Bitrate limits and the Shannon-Hartley theorem
- Shannon limit / Bitrate limits and the Shannon-Hartley theorem
- Sigfox
- about / Sigfox
- physical layer / Sigfox physical layer
- MAC layer / Sigfox MAC layer
- protocol stack / Sigfox protocol stack
- topology / Sigfox topology
- signal-to-noise ratio (SNR) / Bitrate limits and the Shannon-Hartley theorem
- slave / Bluetooth 5 communication process and topologies
- Slot Availability Masks (SAM) / Bluetooth history, Bluetooth 5 PHY and interference
- smart city
- about / Smart city
- use cases / Smart city IoT use cases
- Software-Defined Networking (SDN)
- about / VPN, Software-Defined Networking
- architecture / SDN architecture
- internetworking / Traditional internetworking
- benefits / SDN benefits
- service chaining / SDN benefits
- dynamic load management / SDN benefits
- bandwidth calendaring / SDN benefits
- Software-Defined Perimeter (SDP)
- about / SDN benefits, Software defined perimeter
- architecture / Software-Defined Perimeter architecture
- software security / Physical and hardware security
- solar harvesting / Solar harvesting
- Spatial Diversity Multiple Access (SDMA) / IEEE 802.11ac
- Spatial Division Multiplexing (SDM) / IEEE 802.11ac
- Spectrum Resource Utilization (SRU) / 802.15 standards
- standalone (SA) / 5G
- standby (SB) / Bluetooth 5 communication process and topologies
- static pages / What about static pages?
- Static point of Interest (POI) / Beaconing
- stepper motors / Stepper motors
- storage security / Storage security
- Stuxnet
- supercapacitors
- about / Supercapacitors
- electric double layer capacitors (EDLC) / Supercapacitors
- psuedocapacitors / Supercapacitors
- SuperFrame Interval (SO) / IEEE 802.15.4 architecture
- Symmetric cryptography / Symmetric cryptography
- System Architecture Evolution (SEA) / 4G-LTE topology and architecture
T
- T.A.R.A.S robot car
- Python code / Taking a look at the Python code
- drive wheels, controlling / Controlling the drive wheels of the robot car
- servo motors, moving / Moving the servos on the robot car
- picture, creating / Taking a picture
- beep noise, creating / Making a beep noise
- LEDs, blinking / Making the LEDs blink
- green LED, controlling / Controlling the green LED on T.A.R.A.S
- dance, creating with internet / Using the internet to make T.A.R.A.S dance
- connecting, to MQTT Broker / Project overview
- Target Beacon Transmit Time (TBTT) / IEEE 802.11 operation
- Target Wake Time (TWT) / IEEE 802.11ah
- Technical Specification Groups (TSG) / Governance models and standards
- temperature sensing / Thermocouples and temperature sensing
- Temporal Key Integrity Protocol (TKIP) / IEEE 802.11 security
- text message, bluetooth-enabled doorbell
- sending, when someone is at door / Sending a text message when someone is at the door
- text message transmission
- account, setting up / Setting up an account for text message transmission
- Twilio account, setting up / Setting up a Twilio account
- thermal harvesting
- thermoelectric / Thermal harvesting
- thermionic / Thermal harvesting
- thermistor / Thermistors
- thermocouple (TC)
- about / Thermocouples and temperature sensing
- Resistance Temperature Detectors (RTD) / Resistance Temperature Detectors
- thermistors / Thermistors
- temperature sensor summary / Temperature sensor summary
- thermoelectric generator (TEG) / Thermal harvesting
- ThingsBoard
- account, creating / Set up an account and create a device
- device, creating / Set up an account and create a device, Create a ThingsBoard device
- sensory data, publishing / Reading sensory data and publishing to ThingsBoard
- dashboard, creating / Creating a dashboard in ThingsBoard
- dashboard, sharing / Sharing your dashboard with a friend
- Thonny / Thonny
- Thread
- about / WPAN with IP – Thread
- architecture / Thread architecture and topology
- topology / Thread architecture and topology
- protocol stack / Thread protocol stack
- routing / Thread routing
- addressing / Thread addressing
- Neighbor discovery (ND) / Neighbor discovery
- Thread architecture
- border router / Thread architecture and topology
- thread routers / Thread architecture and topology
- REEDs / Thread architecture and topology
- end devices / Thread architecture and topology
- sleepy end devices / Thread architecture and topology
- threat / Part 5 – Threat and security in IoT
- time-to-live field (TTL) / Bluetooth mesh topology
- time diversity / Narrowband versus wideband communication
- Time Division Duplex (TDD) / Bluetooth 5 PHY and interference , 4G-LTE spectrum allocation and bands
- Time Division Multiple Access (TDMA) / Bluetooth 5 PHY and interference , Cellular access technologies
- Time of Flight (TOF) / LiDAR and active sensing systems
- TI sensorTag CC2650 / Functional example – TI SensorTag CC2650
- Tracking Area (TA) / 4G-LTE topology and architecture
- Tracking Area Identity (TAI) / 4G-LTE geographical areas, dataflow, and handover procedures
- Tracking Area Update (TAU) / LTE Cat-0
- transportation and logistics
- about / Transportation and logistics
- use cases / Transportation and logistics IoT use cases
- transport blocks (TB) / 4G-LTE E-UTRAN protocol stack
- Transport Layer Security (TLS) / 6LoWPAN security, Network stack – Transport Layer Security
- Trusted Platform Module (TPM) / Key management and trusted platform modules
- Twilio
- installing, on Raspberry Pi / Installing Twilio on our Raspberry Pi
- text, sending through / Sending a text through Twilio
- Twilio account
- setting up / Setting up a Twilio account
- home security dashboard, creating / Creating a new home security dashboard
U
- Ultra Narrow Band (UNB) / Sigfox physical layer
- unacknowledged messages / Bluetooth mesh addressing modes
- Universal Integrated Circuit Card (UICC) / 4G-LTE topology and architecture
- US Congressional Bill
- user equipment (UE) / 4G-LTE spectrum allocation and bands
V
- Validation Authority (VA) / Public Key Infrastructure
- value of a network / The value of a network and Metcalfe's and Beckstrom's law
- vehicle-to-infrastructure (V2I) model / IEEE 802.11p vehicle-to-vehicle
- vehicle-to-vehicle (V2V) / IEEE 802.11p vehicle-to-vehicle
- VLAN / VLAN
- Voice over Internet Protocol (VOIP) / Traffic shaping and QoS
- Voice over IP (VOIP) / 4G-LTE topology and architecture
- VPN
W
- weather data
- Morse code representation / Morse code weather data
- accessing, from cloud / Accessing weather data from the cloud
- servo, controlling / Controlling the servo using weather data
- servo position, modifying / Changing the position of the servo based on weather data
- Weather Underground / Weather Underground
- web page
- creating, CherryPy used / Creating a simple web page using CherryPy
- static pages / What about static pages?
- HTML weather dashboard / HTML weather dashboard
- wideband communication
- versus narrowband communication / Narrowband versus wideband communication
- Wireless Access in Vehicular Environments (WAVE) / IEEE 802.11p vehicle-to-vehicle
- Wireless Mobility Internet Access (WiMAX) / 4G-LTE topology and architecture
- Wireless Personal Area Networks (WPANs)
- standards / Wireless personal area network standards
- 802.15 standards / 802.15 standards
- Bluetooth / Bluetooth
- IEEE 802.15.4 / IEEE 802.15.4
- Zigbee / Zigbee
- Z-Wave / Z-Wave
- WLAN / IEEE 802.11 protocols and WLAN
- Working Groups (WG) / Governance models and standards
Z
- Z-Wave
- about / Z-Wave
- overview / Z-Wave overview
- controller device / Z-Wave overview
- slave device/node / Z-Wave overview
- protocol stack / Z-Wave protocol stack
- PHY layer / Z-Wave protocol stack
- MAC layer / Z-Wave protocol stack
- transfer layer / Z-Wave protocol stack
- routing layer / Z-Wave protocol stack
- application layer / Z-Wave protocol stack
- addressing / Z-Wave addressing
- topology / Z-Wave topology and routing
- routing / Z-Wave topology and routing
- Z-Wave, controllers
- status update controller (SUC) / Z-Wave overview
- SUC ID server (SIS) / Z-Wave overview
- bridge controller / Z-Wave overview
- installer controller / Z-Wave overview
- Z-Wave, slaves
- routing slave / Z-Wave overview
- enhanced slave / Z-Wave overview
- Zigbee
- about / Zigbee
- history / Zigbee history
- overview / Zigbee overview
- Zigbee controller (ZC) / Zigbee overview
- Zigbee router (ZR) / Zigbee overview
- Zigbee End Devices (ZED) / Zigbee overview
- star network / Zigbee overview
- cluster tree / Zigbee overview
- mesh network / Zigbee overview
- Zigbee PHY / Zigbee PHY and MAC (and difference from IEEE 802.15.4)
- MAC / Zigbee PHY and MAC (and difference from IEEE 802.15.4)
- protocol stack / Zigbee protocol stack
- addressing / Zigbee addressing and packet structure
- packet structure / Zigbee addressing and packet structure
- long address (64 bit) / Zigbee addressing and packet structure
- short address (16 bit) / Zigbee addressing and packet structure
- mesh routing / Zigbee mesh routing
- broadcasting / Zigbee mesh routing
- mesh routing (table routing) / Zigbee mesh routing
- tree routing / Zigbee mesh routing
- source routing / Zigbee mesh routing
- association / Zigbee association
- security / Zigbee security
- master key / Zigbee security
- network key / Zigbee security
- link key / Zigbee security
- Zigbee coordinator (ZC) / Zigbee association
- Zigbee device object (ZDO) / Zigbee protocol stack
- Zigbee End Devices (ZED) / Zigbee overview, Zigbee association