Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

Demystifying Internet of Things Security

Successful IoT Device/Edge and Platform Security Deployment

by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Demystifying Internet of Things Security

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions

What You'll Learn: Secure devices, immunizing them against different threats originating from inside and outside the network; Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms; Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth.

Who This Book Is For: Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

This open book is licensed under a Creative Commons License (CC BY). You can download Demystifying Internet of Things Security ebook for free in PDF format (9.7 MB).

Table of Contents

About the Authors
 
Acknowledgments
 
Foreword
 
Introduction
 
Chapter 1
Conceptualizing the Secure Internet of Things
Chapter 2
IoT Frameworks and Complexity
Chapter 3
Base Platform Security Hardware Building Blocks
Chapter 4
IoT Software Security Building Blocks
Chapter 5
Connectivity Technologies for IoT
Chapter 6
IoT Vertical Applications and Associated Security Requirements
Appendix
Conclusion
Index
 

Book Details

Title
Demystifying Internet of Things Security
Subject
Computer Science
Publisher
Apress
Published
2020
Pages
488
Edition
1
Language
English
ISBN13
9781484228951
ISBN10
1484228952
ISBN13 Digital
9781484228968
ISBN10 Digital
1484228960
PDF Size
9.7 MB
License
CC BY

Related Books

Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Enabling Things to Talk
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Freque...
Autonomous Control for a Reliable Internet of Services
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...