Advertisement

Table of contents

  1. Front Matter
    Pages i-xxx
  2. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 1-21 Open Access
  3. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 23-148 Open Access
  4. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 149-212 Open Access
  5. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 213-346 Open Access
  6. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 347-411 Open Access
  7. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
    Pages 413-462 Open Access
  8. Back Matter
    Pages 463-488

About this book

Introduction

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions

Keywords

Internet of Things IoT Security Device connectivity Software Security IoT Frameworks Intel Strategists Developers Architects Open Access

Authors and affiliations

  • Sunil Cheruvu
    • 1
  • Anil Kumar
    • 2
  • Ned Smith
    • 3
  • David M. Wheeler
    • 4
  1. 1.ChandlerUSA
  2. 2.ChandlerUSA
  3. 3.BeavertonUSA
  4. 4.GilbertUSA

Bibliographic information