O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14–Secure IoT Architecture Patterns

In this chapter, we will dive deeper into IoT design and how we use modular functional building-blocks to construct an overall secure IoT architecture. We will discuss each functional area, its requirements and how we can fulfill them. We will learn how to pick and mix functionality blocks to provide the best technology for each purpose. Additionally, we will be introduced to threat models and how we can apply them to build security into the design.

What the reader will learn in this chapter:

  1. Basic IoT architecture
  2. Functional areas (device connectivity, event processing and data management, presentation)
  3. Basic building blocks used to construct IoT
  4. Threat modeling and building security into the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required