full screen
Demystifying Internet of Things Security

Demystifying Internet of Things Security


     0     
5
4
3
2
1



International Edition


About the Book

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions
What You'll Learn

  • Secure devices, immunizing them against different threats originating from inside and outside the network
  • Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms
  • Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth

Who This Book Is For
Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.


About the Author: Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform.

At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.) Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel.

Anil Kumar is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation, and is responsible for the Connectivity Platform Architecture across IOTG. In this role, he leads the effort with the planning team to create IOTG's first ever roadmap for connectivity solutions. He is currently driving platform and chip level integration of several key connectivity and communication technologies which are critical for Cyber Physical Systems. Anil joined Intel in 2007 as a design engineer in Digital Home Group. He served as Platform Architect for several Intel Architecture based Media Processors for TV and Set Top Box applications. As the chief architect in Intel Media Group Anil lead several designs that resulted in award winning consumer electronic device designs at CES. The world's first Google TV devices were based on reference design efforts lead by Anil as well. Prior to joining Intel, Anil held design engineering positions at multinational companies such as Fujitsu & Alcatel. He was instrumental in taking several designs from concept to production throughout his career.

Ned Smith is a Principal Engineer in the Open Technology Center (OTC) team in the Software Solutions Group at Intel Corporation. He is responsible for defining Internet of Things security architecture and standards for open IoT technologies. This includes defining IoT architecture for Open Connectivity Foundation (OCF) and IPSO Alliance. Ned chairs the Security, Privacy and Identity (SPI) work group in IPSO Alliance. He is co-author of the Internet Engineering Task Force (IETF) draft specification, draft-hardjono-ace-fluffy-03 that defines key management for constrained environments.
Ned joined Intel Labs in 1995 where he helped define the Common Data Security Architecture (CDSA) that was standardized by the Open Group. He chaired the Infrastructure Workgroup (IWG) in the Trusted Computing Group (TCG) from its inception until 2006. The IWG may best be known for its work on Network Access Control (NAC) standards that later became the Trusted Network Connect (TNC) working group within the TCG. The TNC standards were adopted by a majority of network security vendors supplying NAC products.
Ned has been highly influential within Intel having contributed to a long list of enterprise and office security technologies including Intel(R) Identity Protection Technology, Intel(R) Anti-theft Technology, Intel(R) Manageability Engine, Intel(R) Converged Security Engine, Intel(R) Trusted Execution Technology, Intel(R) Insider(TM), Intel(R) Virtualization Technology, Intel(R) Deep Defender(TM), Intel(R) Platform Trust Technology, Intel(R) Software Guard Extensions and numerous other security, privacy, identity and access management related projects.
Ned is a prolific inventor having received Intel's highest award for patent filing in 2014. He has more than 115 patents granted and over 290 patents pending.
Dave Wheeler is a Senior Principal Engineer in the Platform Security Division of IAGS at Intel Corporation and has thirty years' experience in software, security and networking. In his current role, Dave is responsible for research and development of new cryptographic algorithms and protocols, security APIs and libraries across Intel including for IoT platforms, performs security reviews on Intel's cryptographic implementations, and represents Intel at the IETF. Within the Internet of Things, Dave has contributed to Intel's Software-Defined Industrial Systems architecture and IOTG's Health Application Platform. Prior to Intel, Dave held various lead software and systems architecture positions at Motorola, Honeywell Bull, General Dynamics, as well as his own consulting firm. Dave has designed and built several hardware security engines, including a Type-2 security coprocessor for a software defined radio, and the Intel Wireless Trust Module, a hardware cryptographic coprocessor on the Intel XScale processor. He has implemented several cryptographic libraries and protocol layers, including an IPSec-type implementation for an SDR radio, header compression protocol layers for IP, TCP, and UDP over multicast, a connectionless network layer protocol, two-factor authentication verification over RADIUS for a firewall VPN, PPP for serial, an instant messaging protocol over Bluetooth, and many others. Dave has been a key contributor to other full-stack product implementations including Intel's Blue River Network appliance, several complete public Internet applications in PHP, JavaScript/Sails, and even VBScript. Dave has also worked on smartcard security for banking and gaming applications at a startup, Touch Technology. While at Motorola in 1992, Dave authored the "Security Association Management Protocol" for the National Security Agency, and subsequently spoke nationally about key management and key management protocols. He has led clean-room implementations for ISAKMP, IKEv2, and a custom network-keying protocol. Dave's extensive experience in security, networking, software and hardware is leveraged across a broad segment of Intel's Internet of Things to make Intel's products and software projects secure.


Best Sellers



Product Details
  • ISBN-13: 9781484228951
  • Publisher: Apress
  • Publisher Imprint: Apress
  • Edition: 1st ed.
  • Language: English
  • Returnable: Y
  • Sub Title: Successful Iot Device/Edge and Platform Security Deployment
  • Width: 156 mm
  • ISBN-10: 1484228952
  • Publisher Date: 14 Aug 2019
  • Binding: Paperback
  • Height: 234 mm
  • No of Pages: 488
  • Spine Width: 27 mm
  • Weight: 770 gr


Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Demystifying Internet of Things Security
Apress -
Demystifying Internet of Things Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Demystifying Internet of Things Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Booksbay (the "CRR Service").


    By submitting any content to Booksbay, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Booksbay (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Booksbay a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Booksbay may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Booksbay's sole discretion. Booksbay reserves the right to change, condense, withhold publication, remove or delete any content on Booksbay's website that Booksbay deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Booksbay does not guarantee that you will have any recourse through Booksbay to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Booksbay reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Booksbay, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Booksbay, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!