O'Reilly logo

Mastering Internet of Things by Peter Waher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Distributing your risks

Centralized processing is not only bad for privacy, scalability, and responsiveness. It is bad for security reasons as well. Centralized nodes easily become vulnerable in Denial of Service (DoS) attacks, especially Distributed Denial of Service (DDoS) attacks. The point of a DoS attack is to flood a central node with requests to deplete its processing power, effectively denying access to the server to its rightful owners. But just as distributing the attack among multiple attacking machines makes the DoS more efficient, distributing the processing makes the system less vulnerable and more resilient to such attacks. Edge computing is based on processing information as close to the source (the edge) as possible. This ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required