Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.
Access control list (ACL)-based systems, 38–39
Advanced encryption standard (AES), 72
AES-CTR block encryption, 74f
security threats and vulnerabilities in, 14t
Application programming interfaces (APIs), 11
Asymmetric protocols, 121
Attacks specific to IoT, 46–48
local attacks over WiFi, 48
Attack techniques in IoT environment, 70–71
Authenticated authorization, ...
Get Securing the Internet of Things now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.