12 Securing IoT communications

This chapter covers

  • Securing IoT communications with Datagram TLS
  • Choosing appropriate cryptographic algorithms for constrained devices
  • Implementing end-to-end security for IoT APIs
  • Distributing and managing device keys

So far, all the APIs you’ve looked at have been running on servers in the safe confines of a datacenter or server room. It’s easy to take the physical security of the API hardware for granted, because the datacenter is a secure environment with restricted access and decent locks on the doors. Often only specially vetted staff are allowed into the server room to get close to the hardware. Traditionally, even the clients of an API could be assumed to be reasonably secure because they were desktop ...

Get API Security in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.