Book Image

Developing IoT Projects with ESP32

By : Vedat Ozan Oner
Book Image

Developing IoT Projects with ESP32

By: Vedat Ozan Oner

Overview of this book

Developing IoT Projects with ESP32 provides end-to-end coverage of secure data communication techniques from sensors to cloud platforms that will help you to develop production-grade IoT solutions by using the ESP32 SoC. You'll learn how to employ ESP32 in your IoT projects by interfacing with different sensors and actuators using different types of serial protocols. This book will show you how some projects require immediate output for end-users, and cover different display technologies as well as examples of driving different types of displays. The book features a dedicated chapter on cybersecurity packed with hands-on examples. As you progress, you'll get to grips with BLE technologies and BLE mesh networking and work on a complete smart home project where all nodes communicate over a BLE mesh. Later chapters will show you how IoT requires cloud connectivity most of the time and remote access to smart devices. You'll also see how cloud platforms and third-party integrations enable endless possibilities for your end-users, such as insights with big data analytics and predictive maintenance to minimize costs. By the end of this book, you'll have developed the skills you need to start using ESP32 in your next wireless IoT project and meet the project's requirements by building effective, efficient, and secure solutions.
Table of Contents (18 chapters)
1
Section 1: Using ESP32
7
Section 2: Local Network Communication
12
Section 3: Cloud Communication

Securing communication with TLS/DTLS

Basically, Transport Layer Security (TLS) is used to encrypt data transmitted over any open network, including the internet, to keep communication between two parties secure. TLS uses both asymmetric keys and symmetric keys to secure a connection. When a client application tries to connect to a server, a process called a TLS handshake happens. During a TLS handshake, the following happens:

  1. Supported cipher suites (encryption algorithms) are exchanged between the parties and one is agreed upon for further communication.
  2. The server is authenticated on the client side by checking its certificate to see whether the certificate is issued by a Certificate Authority (CA). This step is important since the client needs to know whether the server is legitimate. A CA is an authority that approves/disapproves the authenticity of a certificate.
  3. A symmetric key is generated for the session communication in a secure way. Both parties use the same...