O'Reilly logo

Mastering Internet of Things by Peter Waher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using trust-based communication to secure the network

Instant messaging, such as that permitted by XMPP, and social networking, build on trust. Using the trust negotiated in your network, you can secure your Internet of Things applications in an efficient manner. Since all participants in the network are identified, and their identities are propagated in your network, it is easy for each thing to build a list of authenticated identities (in XMPP, it is called a roster), which should have access to its information. Since the identities, and their corresponding broker domains, are already authenticated, the things do not need to perform the authentication themselves.

In XMPP, trust between entities in the network is implemented using presence ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required