O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13–Designing the Secure IoT

In this chapter, we will discuss why designing for the IoT differs in some respects to building traditional IT architectures. We will consider the scale, scope and communication challenges that present themselves and show how we can use IoT models to build proof of concept models. Further we will discuss the choice of communication patterns and when they are best suited to particular design situations. Additionally, we will look at some design first principles for the IoT.

What the reader will learn from this chapter:

  1. Why designing the IoT differs from IT & M2M architectures
  2. What tools and techniques are available for IoT
  3. Understand the IoT communication patterns
  4. How to build IoT proof of concept models ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required