Book Image

Internet of Things from Scratch

By : Renaldi Gondosubroto
Book Image

Internet of Things from Scratch

By: Renaldi Gondosubroto

Overview of this book

Develop the skills essential for building Internet of Things solutions with this indispensable guide. In an era where industries heavily rely on IoT, this book will quickly familiarize you with its foundations, widespread use, implementation guided by best practices, and the crucial technologies that allow it to work effectively. Starting with the use of IoT in real-life scenarios, this book offers comprehensive insights into basic IoT hardware, protocols, and technologies. You’ll then learn about architecting and implementing solutions such as wireless sensor networks, cloud computing with AWS, and crucial security considerations. You’ll understand how these systems are operated and monitored over time and work with simple to complex, industry-grade systems, adhering to best practices. In later chapters, you’ll be apprised of future IoT trends and strategies to manage the risks and opportunities that come with them. You’ll also get to grips with a diverse set of tools, including hardware such as ESP32 and Raspberry Pi, and software such as Mosquitto and ChatGPT for generative AI capabilities. By the end of this IoT book, you’ll be able to independently build and design complex, industry-standard solutions fully aligned with best practices.
Table of Contents (22 chapters)
1
Part 1: Getting Started with the Internet of Things
6
Part 2: Developing and Optimizing IoT Systems for Smart Environments
11
Part 3: Operating, Maintaining, and Securing IoT Networks
16
Part 4: Delving into Complex Systems and the Future of IoT

The current state of risk and security within IoT

As IoT technology continues to evolve and expand into new areas of our lives, it is critical that we understand the current state of risk and security within IoT networks. In this section, we will explore the current landscape of IoT security, including the most common types of IoT security threats and the current state of IoT security standards and regulations. We will also discuss best practices for securing IoT networks and devices, as well as challenges and opportunities for improving IoT security in the future. We can start off by taking a look at how security encompasses IoT in Figure 11.1:

Figure 11.1 – Overview of how security encompasses IoT

Figure 11.1 – Overview of how security encompasses IoT

Figure 11.1 presents a structured overview of the current state of risk and security within IoT. The diagram is segmented into four main columns, representing distinct aspects of IoT: Device, Communications, Cloud platform and services, and Use Cases...