© The Author(s) 2020
S. Cheruvu et al.Demystifying Internet of Things Securityhttps://doi.org/10.1007/978-1-4842-2896-8_1

1. Conceptualizing the Secure Internet of Things

Sunil Cheruvu1 , Anil Kumar1, Ned Smith2 and David M. Wheeler3
(1)
Chandler, AZ, USA
(2)
Beaverton, OR, USA
(3)
Gilbert, AZ, USA
 

In this chapter we relate several iconic attacks on cyber-physical IoT systems to illustrate the clever ways attackers are able to achieve their objectives. The physicality of cyber-physical systems and resource limitations of constrained IoT devices present new challenges, both for attackers and systems designers. This chapter explores security trade-off consequences resulting from design decisions aimed at reducing device cost. We advocate more enlightened ...

Get Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.