Chapter 14–Secure IoT Architecture Patterns

In this chapter, we will dive deeper into IoT design and how we use modular functional building-blocks to construct an overall secure IoT architecture. We will discuss each functional area, its requirements and how we can fulfill them. We will learn how to pick and mix functionality blocks to provide the best technology for each purpose. Additionally, we will be introduced to threat models and how we can apply them to build security into the design.

What the reader will learn in this chapter:

  1. Basic IoT architecture
  2. Functional areas (device connectivity, event processing and data management, presentation)
  3. Basic building blocks used to construct IoT
  4. Threat modeling and building security into the ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.