O'Reilly logo

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT by Marcelo Yannuzzi, Rik Irons-Mclean, Anthony Sabella

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Symbols

5G, 800

6LoWPAN (IPv6 Low Power Wireless Personal Area Network), 74

802.1X authentication, 363-365

802.1X Flexible Authentication, 366-367

802.11p, 800

A

AAA (authentication, authorization, accounting), 279, 337, 361-362

accounting, 397-398

framework guidelines, 399

requirements, 400-401

centralizing, 268

ODL, 206

standard configuration example, 342-343

tenant/user, 279-280

acceptance, 16

access-accept messages, 362

access-challenge messages, 362

access control

ACLs, 374-376

AWS, 394-397

back-end platform, 637-646

building blocks, 326

complex devices, 345

constrained devices, 345

classes, 345-346

identifying, 348-351

restrictions, 345

data protection, 504

device identification, 336-337

Device Sensor, 340, 343-345

AAA configuration ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required