Security

Authentication and authorization of users is a challenge that we have already conquered. Now, we are adding new types of users called smart devices. And they also need to be authenticated and authorized in a similar fashion, and every packet that comes and goes between the cloud and the device needs to be monitored closely for data integrity as well as secured communication.

Not only does the communication between the device and the device management software need to be secure, but also the other entities that are interested in exchanging data with the IoT middleware need to be authorized. Another layer of protection can be added by encrypting data while persisting in the database. This would be an additional layer of security on ...

Get Enterprise Internet of Things Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.