11
Security in the IoT Context
Previous chapters provided examples of how IoT can be used to provide solutions to achieve various business targets within diverse problem domains. As a solution scales and graduates from the proof of concept stage to the production deployment stage, one crucial barrier that needs to be crossed is making these solutions secure from the acts of malicious actors. Security generally has the highest priority among non-functional requirements (NFRs) in any solution; however, in the case of IoT solutions, this requirement becomes non-negotiable due to the potential risk of material and/or human loss. It is no surprise, then, that security is cited as one of the topmost factors that can limit the adoption of IoT solutions ...
Get Architectural Patterns and Techniques for Developing IoT Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.