Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...

Full description

Saved in:
Bibliographic Details
Main Author: Cheruvu, Sunil (auth)
Other Authors: Kumar, Anil (auth), Smith, Ned (auth), Wheeler, David M. (auth)
Format: Electronic Book Chapter
Language:English
Published: Berkeley, CA Springer Nature 2020
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_39473
005 20210210
003 oapen
006 m o d
007 cr|mn|---annan
008 20210210s2020 xx |||||o ||| 0|eng d
020 |a 978-1-4842-2896-8 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-1-4842-2896-8  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KJQ  |2 bicssc 
072 7 |a UKN  |2 bicssc 
072 7 |a UR  |2 bicssc 
100 1 |a Cheruvu, Sunil  |4 auth 
700 1 |a Kumar, Anil  |4 auth 
700 1 |a Smith, Ned  |4 auth 
700 1 |a Wheeler, David M.  |4 auth 
245 1 0 |a Demystifying Internet of Things Security  |b Successful IoT Device/Edge and Platform Security Deployment 
260 |a Berkeley, CA  |b Springer Nature  |c 2020 
300 |a 1 electronic resource (488 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0  |2 cc  |4 https://creativecommons.org/licenses/by/4.0 
546 |a English 
650 7 |a Business mathematics & systems  |2 bicssc 
650 7 |a Network hardware  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
653 |a Computer science 
653 |a Computer communication systems 
653 |a Computer security 
653 |a Information technology 
653 |a Business-Data processing 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/39473  |7 0  |z DOAB: description of the publication