IoT: Building Arduino-Based Projects

Explore and learn about Internet of Things to develop interactive Arduino-based Internet projects
Preview in Mapt

IoT: Building Arduino-Based Projects

Peter Waher et al.

4 customer reviews
Explore and learn about Internet of Things to develop interactive Arduino-based Internet projects
Mapt Subscription
FREE
$20.83/m after trial
eBook
$44.80
RRP $63.99
Save 29%
Print + eBook
$79.99
RRP $79.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$44.80
$79.99
$20.83p/m after trial
RRP $63.99
RRP $79.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


IoT: Building Arduino-Based Projects Book Cover
IoT: Building Arduino-Based Projects
$ 63.99
$ 44.80
Intelligent IoT Projects in 7 Days Book Cover
Intelligent IoT Projects in 7 Days
$ 31.99
$ 22.40
Buy 2 for $35.00
Save $60.98
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781787120631
Paperback715 pages

Book Description

The IoT: Building Arduino-Based Projects course will take you on a journey to become an expert in the use of IoT by developing a set of projects and finally guide you onto securing your IoT environment.

The course begins with exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. In the first module Learning Internet of Things, you will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. This module gives you a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things.

The second module, Internet of Things with Arduino Blueprints provides you up to eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users―creating smart, pervasive, and always-connected environments. You can use these projects as blueprints for many other IoT projects and put them to good use.

It has becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. Thus, our third module, Practical Internet of Things Security provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The aim is to showcase how the IoT is implemented in early adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.

Table of Contents

Chapter 1: Preparing our IoT Projects
Creating the sensor project
Creating the actuator project
Creating a controller
Creating a camera
Summary
Chapter 2: The HTTP Protocol
HTTP basics
Adding HTTP support to the sensor
Adding HTTP support to the actuator
Adding HTTP support to the controller
Summary
Chapter 3: The UPnP Protocol
Introducing UPnP
Creating a device description document
Creating the service description document
Providing a web interface
Creating a UPnP interface
Implementing the Still Image service
Using our camera
Summary
Chapter 4: The CoAP Protocol
Making HTTP binary
Adding CoAP to our sensor
Adding CoAP to our actuator
Using CoAP in our controller
Summary
Chapter 5: The MQTT Protocol
Publishing and subscribing
Adding MQTT support to the sensor
Adding MQTT support to the actuator
Adding MQTT support to the controller
Summary
Chapter 6: The XMPP Protocol
XMPP basics
Adding XMPP support to a thing
Providing an additional layer of security
Adding XMPP support to the actuator
Adding XMPP support to the camera
Adding XMPP support to the controller
Connecting it all together
Summary
Chapter 7: Using an IoT Service Platform
Selecting an IoT platform
The Clayster platform
Interfacing our devices using XMPP
Creating our control application
Summary
Chapter 8: Creating Protocol Gateways
Understanding protocol bridging
Using an abstraction model
The basics of the Clayster abstraction model
Understanding the CoAP gateway architecture
Summary
Chapter 9: Security and Interoperability
Understanding the risks
Modes of attack
Tools for achieving security
The need for interoperability
Summary
Chapter 10: Internet-Controlled PowerSwitch
Getting started
Selecting a PowerSwitch Tail
Turning PowerSwitch Tail into a simple web server
Adding a Cascade Style Sheet to the web user interface
Finding the MAC address and obtaining a valid IP address
Summary
Chapter 11: Wi-Fi Signal Strength Reader and Haptic Feedback
Prerequisites
Arduino WiFi Shield
Wi-Fi signal strength and RSSI
Haptic feedback and haptic motors
Implementing a simple web server
Summary
Chapter 12: Internet-Connected Smart Water Meter
Prerequisites
Water flow sensors
Adding an LCD screen to the water meter
Converting your water meter to a web server
Summary
Chapter 13: Arduino Security Camera with Motion Detection
Prerequisites
Getting started with TTL Serial Camera
Connecting the TTL Serial Camera with Arduino and Ethernet Shield
Uploading images to Flickr
Summary
Chapter 14: Solar Panel Voltage Logging with NearBus Cloud Connector and Xively
Connecting a solar cell with the Arduino Ethernet board
Setting up a NearBus account
Defining a new device
Creating and configuring a Xively account
Configuring the NearBus connected device for Xively
Developing a web page to display the real-time voltage values
Summary
Chapter 15: GPS Location Tracker with Temboo, Twilio, and Google Maps
Hardware and software requirements
Getting started with the Arduino GPS shield
Connecting the Arduino GPS shield with the Arduino Ethernet board
Getting started with Twilio
Creating Twilio Choreo with Temboo
Summary
Chapter 16: Tweet-a-Light – Twitter-Enabled Electric Light
Hardware and software requirements
Getting started with Python
Creating a Twitter app and obtaining API keys
Reading the serial data using Arduino
Summary
Chapter 17: Controlling Infrared Devices Using IR Remote
Building an Arduino infrared recorder and remote
Building the IR receiver module
Adding an IR socket to non-IR enabled devices
Summary
Chapter 18: A Brave New World
Defining the IoT
Why cross-industry collaboration is vital
IoT uses today
The IoT in the enterprise
The IoT of the future and the need to secure
Summary
Chapter 19: Vulnerabilities, Attacks, and Countermeasures
Primer on threats, vulnerability, and risks (TVR)
Primer on attacks and countermeasures
Today's IoT attacks
Lessons learned and systematic approaches
Summary
Chapter 20: Security Engineering for IoT Development
Building security in to design and development
Secure design
Summary
Chapter 21: The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Summary
Chapter 22: Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Summary
Chapter 23: Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
The identity lifecycle
Authentication credentials
IoT IAM infrastructure
Authorization and access control
Summary
Chapter 24: Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
PbD principles
Privacy engineering recommendations
Summary
Chapter 25: Setting Up a Compliance Monitoring Program for the IoT
IoT compliance
A complex compliance environment
Summary
Chapter 26: Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Summary
Chapter 27: IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response
Summary

What You Will Learn

  • Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
  • Use important communication patterns, such as the request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
  • Build a portable Wi-Fi signal strength sensor to give haptic feedback about signal strength to the user
  • Measure the water flow speed and volume with liquid flow sensors and record real-time readings
  • Secure your home with motion-activated Arduino security cameras and upload images to the cloud
  • Implement real-time data logging of a solar panel voltage with Arduino cloud connectors
  • Track locations with GPS and upload location data to the cloud
  • Control infrared-enabled devices with IR remote and Arduino
  • Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem

Authors

Table of Contents

Chapter 1: Preparing our IoT Projects
Creating the sensor project
Creating the actuator project
Creating a controller
Creating a camera
Summary
Chapter 2: The HTTP Protocol
HTTP basics
Adding HTTP support to the sensor
Adding HTTP support to the actuator
Adding HTTP support to the controller
Summary
Chapter 3: The UPnP Protocol
Introducing UPnP
Creating a device description document
Creating the service description document
Providing a web interface
Creating a UPnP interface
Implementing the Still Image service
Using our camera
Summary
Chapter 4: The CoAP Protocol
Making HTTP binary
Adding CoAP to our sensor
Adding CoAP to our actuator
Using CoAP in our controller
Summary
Chapter 5: The MQTT Protocol
Publishing and subscribing
Adding MQTT support to the sensor
Adding MQTT support to the actuator
Adding MQTT support to the controller
Summary
Chapter 6: The XMPP Protocol
XMPP basics
Adding XMPP support to a thing
Providing an additional layer of security
Adding XMPP support to the actuator
Adding XMPP support to the camera
Adding XMPP support to the controller
Connecting it all together
Summary
Chapter 7: Using an IoT Service Platform
Selecting an IoT platform
The Clayster platform
Interfacing our devices using XMPP
Creating our control application
Summary
Chapter 8: Creating Protocol Gateways
Understanding protocol bridging
Using an abstraction model
The basics of the Clayster abstraction model
Understanding the CoAP gateway architecture
Summary
Chapter 9: Security and Interoperability
Understanding the risks
Modes of attack
Tools for achieving security
The need for interoperability
Summary
Chapter 10: Internet-Controlled PowerSwitch
Getting started
Selecting a PowerSwitch Tail
Turning PowerSwitch Tail into a simple web server
Adding a Cascade Style Sheet to the web user interface
Finding the MAC address and obtaining a valid IP address
Summary
Chapter 11: Wi-Fi Signal Strength Reader and Haptic Feedback
Prerequisites
Arduino WiFi Shield
Wi-Fi signal strength and RSSI
Haptic feedback and haptic motors
Implementing a simple web server
Summary
Chapter 12: Internet-Connected Smart Water Meter
Prerequisites
Water flow sensors
Adding an LCD screen to the water meter
Converting your water meter to a web server
Summary
Chapter 13: Arduino Security Camera with Motion Detection
Prerequisites
Getting started with TTL Serial Camera
Connecting the TTL Serial Camera with Arduino and Ethernet Shield
Uploading images to Flickr
Summary
Chapter 14: Solar Panel Voltage Logging with NearBus Cloud Connector and Xively
Connecting a solar cell with the Arduino Ethernet board
Setting up a NearBus account
Defining a new device
Creating and configuring a Xively account
Configuring the NearBus connected device for Xively
Developing a web page to display the real-time voltage values
Summary
Chapter 15: GPS Location Tracker with Temboo, Twilio, and Google Maps
Hardware and software requirements
Getting started with the Arduino GPS shield
Connecting the Arduino GPS shield with the Arduino Ethernet board
Getting started with Twilio
Creating Twilio Choreo with Temboo
Summary
Chapter 16: Tweet-a-Light – Twitter-Enabled Electric Light
Hardware and software requirements
Getting started with Python
Creating a Twitter app and obtaining API keys
Reading the serial data using Arduino
Summary
Chapter 17: Controlling Infrared Devices Using IR Remote
Building an Arduino infrared recorder and remote
Building the IR receiver module
Adding an IR socket to non-IR enabled devices
Summary
Chapter 18: A Brave New World
Defining the IoT
Why cross-industry collaboration is vital
IoT uses today
The IoT in the enterprise
The IoT of the future and the need to secure
Summary
Chapter 19: Vulnerabilities, Attacks, and Countermeasures
Primer on threats, vulnerability, and risks (TVR)
Primer on attacks and countermeasures
Today's IoT attacks
Lessons learned and systematic approaches
Summary
Chapter 20: Security Engineering for IoT Development
Building security in to design and development
Secure design
Summary
Chapter 21: The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Summary
Chapter 22: Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Summary
Chapter 23: Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
The identity lifecycle
Authentication credentials
IoT IAM infrastructure
Authorization and access control
Summary
Chapter 24: Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
PbD principles
Privacy engineering recommendations
Summary
Chapter 25: Setting Up a Compliance Monitoring Program for the IoT
IoT compliance
A complex compliance environment
Summary
Chapter 26: Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Summary
Chapter 27: IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response
Summary

Book Details

ISBN 139781787120631
Paperback715 pages
Read More
From 4 reviews

Read More Reviews

Recommended for You

Python Machine Learning Book Cover
Python Machine Learning
$ 35.99
$ 25.20
Internet of Things with Arduino Blueprints Book Cover
Internet of Things with Arduino Blueprints
$ 31.99
$ 22.40
Learning Internet of Things Book Cover
Learning Internet of Things
$ 26.99
$ 18.90
Building a Home Security System with Raspberry Pi Book Cover
Building a Home Security System with Raspberry Pi
$ 27.99
$ 19.60
Practical Data Science Cookbook Book Cover
Practical Data Science Cookbook
$ 29.99
$ 21.00
Azure for Architects Book Cover
Azure for Architects
$ 35.99
$ 25.20