O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18–Secure IoT Design

Following on from the network protocol design for IP networks in the last chapter, we will now look at more IoT specific protocols for publish/ subscribe models best suited in wireless sensor networks (WSN). In this more technical discussion we will examine the most commonly deployed publish/ subscribe protocols, why they are used and their advantages over alternative network patterns. In this chapter the reader will learn:

  1. Why IP and HTTP are often unsuitable in IoT designs
  2. About Publish/subscribe patterns
  3. About the Message Queuing Telemetry Transport or MQTT
  4. MQTT benefits and issues
  5. How to secure MQTT
  6. Alternative IoT protocols in WSN
  7. The IoT stack
  8. CoAP and 6LowPAN their benefits and issues

In the previous ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required