Book Image

Developing IoT Projects with ESP32

By : Vedat Ozan Oner
Book Image

Developing IoT Projects with ESP32

By: Vedat Ozan Oner

Overview of this book

Developing IoT Projects with ESP32 provides end-to-end coverage of secure data communication techniques from sensors to cloud platforms that will help you to develop production-grade IoT solutions by using the ESP32 SoC. You'll learn how to employ ESP32 in your IoT projects by interfacing with different sensors and actuators using different types of serial protocols. This book will show you how some projects require immediate output for end-users, and cover different display technologies as well as examples of driving different types of displays. The book features a dedicated chapter on cybersecurity packed with hands-on examples. As you progress, you'll get to grips with BLE technologies and BLE mesh networking and work on a complete smart home project where all nodes communicate over a BLE mesh. Later chapters will show you how IoT requires cloud connectivity most of the time and remote access to smart devices. You'll also see how cloud platforms and third-party integrations enable endless possibilities for your end-users, such as insights with big data analytics and predictive maintenance to minimize costs. By the end of this book, you'll have developed the skills you need to start using ESP32 in your next wireless IoT project and meet the project's requirements by building effective, efficient, and secure solutions.
Table of Contents (18 chapters)
1
Section 1: Using ESP32
7
Section 2: Local Network Communication
12
Section 3: Cloud Communication

Summary

Cyber security is an important aspect of any IoT project, and it is always a good idea to apply security best practices while designing and developing IoT products. For ESP32, it means enabling secure boot and flash encryption before rolling out a new product in the field. The application firmware also needs to support OTA updates for new versions to patch any security vulnerabilities. TLS/DTLS protocols can be employed at the application level to secure communication with remote servers or any other computing devices. In this chapter, we have learned some techniques to secure our IoT devices.

Nonetheless, it is hard to say we can have 100% secure devices even if we think we have taken all precautions. It is always good practice to look for any possible vulnerabilities after installation in the field and set up an infrastructure to monitor the health of installed devices when necessary.

We will continue with another connectivity feature of ESP32 in the next chapter. As...