This chapter classifies the security requirements and vulnerabilities in the Internet of Things (IoT), and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals, through various smart home devices. Some hazards including unauthorized surveillance, identity theft, monetary theft, vandalism, etc. are addressed. This chapter focuses on the technical implementation of IoT security architecture, and addresses aspects of security including confidentiality, integrity, availability, nonrepudiation, authenticity, and privacy. Some challenges to securing the IoT are discussed, including poor design and implementation, li...
- Chapter 2. Security Architecture in the Internet of Things
- from Securing the Internet of Things
- Publisher: Syngress
- Released: January 2017
I'd to discuss this with you,
Share this highlighthttp://www.safaribooksonline.com/a/securing-the-internet/7273965/