O'Reilly logo

Mastering Internet of Things by Peter Waher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding the root causes

So, how do we avoid repeating the same mistakes? Are these vulnerabilities and security threats an intrinsic part of the internet that we cannot counteract, and therefore we do not even try? Or are there methods that can be used to significantly improve the security in communication?

The major problem was that solutions were devised before the whole problem was understood. They wanted to find a method to transmit messages between computers in interconnected networks. They managed to do that exceedingly well. They did not consider, however, how to avoid the injection of fraudulent messages, or eavesdropping on transmitted messages. So, these were left out in the underlying protocols. As it became evident that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required