Securing WSN 

WSNs can consist of thousands or more low-power battery-operated sensors that communicate using protocols, such as ZigBee, Z-Wave, Bluetooth, NFC, or Thread. WSNs make use of gateways that can act as translation devices between the short-range RF protocols and IP-based protocols that communicate with the cloud. Security administrators must consider the secure configuration of the devices and protocols used within WSNs, as well as how to manage securely keys used within WSNs.

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.