CHAPTER 23
Internet of Things (IoT) Security
Things on the Internet of Things
Components of IoT-Enabled Things
23.2 IoT Security Concepts and Objectives
Unique Characteristics of the IoT Ecosystem
Tamper Resistance and Detection
23.3 An Open-Source IoT Security Module
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Explain the scope of the Internet of Things.
- ◆ List and discuss the five principal components of IoT-enabled things.
- ◆ Understand the relationship between cloud computing ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.