O'Reilly logo
  • Andrea Kole thinks this is interesting:

This chapter classifies the security requirements and vulnerabilities in the Internet of Things (IoT), and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals, through various smart home devices. Some hazards including unauthorized surveillance, identity theft, monetary theft, vandalism, etc. are addressed. This chapter focuses on the technical implementation of IoT security architecture, and addresses aspects of security including confidentiality, integrity, availability, nonrepudiation, authenticity, and privacy. Some challenges to securing the IoT are discussed, including poor design and implementation, li...

From

Cover of Securing the Internet of Things

Note

I'd to discuss this with you,