July 2018
Intermediate to advanced
324 pages
9h 31m
English
Low-end and remotely positioned field devices might be resource-constrained, with respect to the following:
However, these constraints do not lower their security necessities in terms of secure bootstrapping, secure firmware updates, identity, secured access, and connectivity. To ensure adequate trustworthiness in these resource-constrained scenarios, the following are some security considerations (IIC-IISF):
Read now
Unlock full access