Chapter 2

Security Architecture in the Internet of Things

Shancang Li

Abstract

This chapter classifies the security requirements and vulnerabilities in the Internet of Things (IoT), and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals, through various smart home devices. Some hazards including unauthorized surveillance, identity theft, monetary theft, vandalism, etc. are addressed. This chapter focuses on the technical implementation of IoT security architecture, and addresses aspects of security including confidentiality, integrity, availability, nonrepudiation, authenticity, and privacy. Some challenges to securing ...

Get Securing the Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.