O'Reilly logo

Securing the Internet of Things by Li Da Xu, Shancang Li

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Security Architecture in the Internet of Things

Shancang Li

Abstract

This chapter classifies the security requirements and vulnerabilities in the Internet of Things (IoT), and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals, through various smart home devices. Some hazards including unauthorized surveillance, identity theft, monetary theft, vandalism, etc. are addressed. This chapter focuses on the technical implementation of IoT security architecture, and addresses aspects of security including confidentiality, integrity, availability, nonrepudiation, authenticity, and privacy. Some challenges to securing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required