Chapter 4–Securing the Unidentified
One of the primary issues when securing the IoT is in understanding what needs to be secured, why and how. Security is all about understanding the device, how it interoperates with others and interfaces with the network. Therefore, securing unidentified devices is impossible, and is something that needs ad- dressing.
In this chapter, we hope to explain:
- How large scale devices can be identified
- How devices can be authenticated
- What sort of devices we need to secure
- Why customers don’t really care
Earlier, we stated that a smartphone was an IoT device, and it surely is as it is packed with sensors and actuators, for example a camera, a microphone, a gyroscope, a barometer, an accelerometer, a compass ...
Get IoT Security Issues now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.