Chapter 13–Designing the Secure IoT

In this chapter, we will discuss why designing for the IoT differs in some respects to building traditional IT architectures. We will consider the scale, scope and communication challenges that present themselves and show how we can use IoT models to build proof of concept models. Further we will discuss the choice of communication patterns and when they are best suited to particular design situations. Additionally, we will look at some design first principles for the IoT.

What the reader will learn from this chapter:

  1. Why designing the IoT differs from IT & M2M architectures
  2. What tools and techniques are available for IoT
  3. Understand the IoT communication patterns
  4. How to build IoT proof of concept models ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.