This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
Les mer
This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment.
Les mer
Introduction and Scope.- Challenges and Objectives.- Cryptographic Toolkit.- Ingredients for Secure Design.- Device Design.
This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
Les mer
Presents a unique collection of ingredients to design secure IoT computing devices Explains which IoT use cases are vulnerable, how they can be misused, and how to protect them Provides competitive market overviews of design elements and guidance for shortlisting
Les mer

Produktdetaljer

ISBN
9783031196652
Publisert
2024-01-03
Utgiver
Vendor
Springer International Publishing AG
Høyde
240 mm
Bredde
168 mm
Aldersnivå
Professional/practitioner, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet

Forfatter

Om bidragsyterne

Kersten Heins is a passionate IoT consultant and freelance content creator, focusing on IoT device design and embedded security. After his graduation he spent 30 years in the industrial computing and semiconductor industry as a design engineer and in various marketing positions.