Skip to Content
Securing the Internet of Things
book

Securing the Internet of Things

by Shancang Li, Li Da Xu
January 2017
Intermediate to advanced
154 pages
4h 32m
English
Syngress
Content preview from Securing the Internet of Things
Chapter 3

Security and Vulnerability in the Internet of Things

Shancang Li

Abstract

This chapter addresses the differences between secrecy and secret-key generation in web applications versus the Internet of Things (IoT). Authentication using OAuth and OpenID is discussed, as well as encryption using secure sockets layer, transport layer security, and HTTPS. The chapter outlines the basic structure of the IoT cloud structure, the machine-to-machine gateway by which systems of smart devices are connected. The vulnerabilities of protecting the IoT using software are discussed, as well as the benefits of implementing a software/firmware update. Types of attacks at the physical layer are discussed, including side channel attack, timing attack, IoT ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security

Practical Internet of Things Security

Brian Russell, Drew Van Duren
Internet of Things

Internet of Things

Rajkumar Buyya, Amir Vahid Dastjerdi
Internet of Things

Internet of Things

S. Velliangiri, Sathish A.P. Kumar, P. Karthikeyan
Internet of Things

Internet of Things

Maciej Kranz

Publisher Resources

ISBN: 9780128045053