Security in endpoint devices – constrained devices

Most of our endpoint devices (constrained) that constitute the sensors, actuators, and controllers don't have enough memory or processing power, and run on low and limited power. Due to these reasons, traditional security approaches cannot be applied to these constrained devices because they use heavy encryption and decryption algorithms that require high processing power, a lot of memory, and power to facilitate the computations in real time.

The solution for this is we can make use of embedded encryption and decryption techniques that are an integral part of sensors and controllers itself. Also, we can put the devices on separate networks and use firewalls to overcome their limitations. ...

Get Internet of Things with Raspberry Pi 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.