Demystifying Internet of Things Security, 1st ed.
Successful IoT Device/Edge and Platform Security Deployment

Authors:

Language: English

Approximative price 36.91 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Publication date:
488 p. · 15.5x23.5 cm · Paperback
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions

What You'll Learn
  • Secure devices, immunizing them against different threats originating from inside and outside the network
  • Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms
  • Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth

Who This Book Is For

Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.




Demystifying Internet of Things Security

Chapter 1: Conceptualizing the Internet of Things

Chapter 2: IoT Frameworks and Complexity Hiding

Chapter 3: Base Platform Security Hardware Building Blocks

Chapter 4: IoT Software Security Building Blocks

Chapter 5: Connectivity Technologies for IoT

Chapter 6: IoT Vertical Applications and Associated Security Requirements
Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years.  Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant.  Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks.  He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform.  

At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.)  Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel.


Anil Kumar is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation, and is responsible for the Connectivity Platform Architecture across IOTG. In this role, he leads the effort with the planning team to create IOTG's first ever roadmap for connectivity solutions. He is currently driving platform and chip level integration of several key connectivity and communication technologies which are critical for Cyber Physical Systems. Anil joined Intel in 2007 as a design engineer in Digital Home Group. He served as Platform Architect for several Intel Architecture based Media Processors for TV and Set Top Box applications. As the chief architect in Intel Media Group Anil lead several designs that resulted in award winning consumer electronic device

Gain an understanding of the wired and wireless connectivity technologies for IoT and the associated security requirements

Learn the different security, regulatory, and industry standard body requirements needed for each IoT vertical

Understand the implications of security software on IoT systems as it relates to key management / lifecycle, software and firmware update processes, trusted execution environments, and cloud computing environments