Heins, Kersten.
Trusted Cellular IoT Devices Design Ingredients and Concepts / [electronic resource] : by Kersten Heins. - 1st ed. 2022. - XVI, 157 p. 56 illus., 55 illus. in color. online resource. - Synthesis Lectures on Engineering, Science, and Technology, 2690-0327 . - Synthesis Lectures on Engineering, Science, and Technology, .
Introduction and Scope -- Challenges and Objectives -- Cryptographic Toolkit -- Ingredients for Secure Design -- Device Design.
This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
9783031196638
10.1007/978-3-031-19663-8 doi
Telecommunication.
Cooperating objects (Computer systems).
Internet of things.
Communications Engineering, Networks.
Cyber-Physical Systems.
Internet of Things.
TK5101-5105.9
621.382
Trusted Cellular IoT Devices Design Ingredients and Concepts / [electronic resource] : by Kersten Heins. - 1st ed. 2022. - XVI, 157 p. 56 illus., 55 illus. in color. online resource. - Synthesis Lectures on Engineering, Science, and Technology, 2690-0327 . - Synthesis Lectures on Engineering, Science, and Technology, .
Introduction and Scope -- Challenges and Objectives -- Cryptographic Toolkit -- Ingredients for Secure Design -- Device Design.
This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
9783031196638
10.1007/978-3-031-19663-8 doi
Telecommunication.
Cooperating objects (Computer systems).
Internet of things.
Communications Engineering, Networks.
Cyber-Physical Systems.
Internet of Things.
TK5101-5105.9
621.382