Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...

Full description

Saved in:
Bibliographic Details
Main Author: Cheruvu, Sunil (auth)
Other Authors: Kumar, Anil (auth), Smith, Ned (auth), Wheeler, David M. (auth)
Format: Book Chapter
Published: Berkeley, CA Springer Nature 2020
Subjects:
Online Access:Get Fullteks
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02885naaaa2200385uu 4500
001 doab_20_500_12854_39473
005 20210210
020 |a 978-1-4842-2896-8 
024 7 |a 10.1007/978-1-4842-2896-8  |c doi 
041 0 |a English 
042 |a dc 
072 7 |a KJQ  |2 bicssc 
072 7 |a UKN  |2 bicssc 
072 7 |a UR  |2 bicssc 
100 1 |a Cheruvu, Sunil  |4 auth 
700 1 |a Kumar, Anil  |4 auth 
700 1 |a Smith, Ned  |4 auth 
700 1 |a Wheeler, David M.  |4 auth 
245 1 0 |a Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment 
260 |a Berkeley, CA  |b Springer Nature  |c 2020 
300 |a 1 electronic resource (488 p.) 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0  |2 cc  |4 https://creativecommons.org/licenses/by/4.0 
546 |a English 
650 7 |a Business mathematics & systems  |2 bicssc 
650 7 |a Network hardware  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
653 |a Computer science 
653 |a Computer communication systems 
653 |a Computer security 
653 |a Information technology 
653 |a Business-Data processing 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf  |7 0  |z Get Fullteks 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/39473  |7 0  |z DOAB: description of the publication