Chapter 9. Share: Securing and sharing web Things

This chapter covers

  • A short overview of security risks and issues on the Web of Things
  • A brief theoretical introduction to HTTPS, certificates, and encryption
  • Best practices and techniques for web-based authorization and access control
  • Learning to implement these best practices and tools on your Raspberry Pi
  • Implementing the Social Web of Things in the WoT gateway

In most cases, Internet of Things deployments involve a group of devices that communicate with each other or with various applications within closed networks—rarely over open networks such as the internet. It would be fair to call such deployments the “intranets of Things” because they’re essentially isolated, private networks ...

Get Building the Web of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.