Chapter 18–Secure IoT Design

Following on from the network protocol design for IP networks in the last chapter, we will now look at more IoT specific protocols for publish/ subscribe models best suited in wireless sensor networks (WSN). In this more technical discussion we will examine the most commonly deployed publish/ subscribe protocols, why they are used and their advantages over alternative network patterns. In this chapter the reader will learn:

  1. Why IP and HTTP are often unsuitable in IoT designs
  2. About Publish/subscribe patterns
  3. About the Message Queuing Telemetry Transport or MQTT
  4. MQTT benefits and issues
  5. How to secure MQTT
  6. Alternative IoT protocols in WSN
  7. The IoT stack
  8. CoAP and 6LowPAN their benefits and issues

In the previous ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.