000 a
999 _c32557
_d32557
008 230902b xxu||||| |||| 00| 0 eng d
020 _a9783031196621
082 _a004.6782
_bHEI
100 _aHeins, Kersten
245 _aTrusted cellular IoT devices : design ingredients and concepts
260 _bSpringer,
_c2022
_aCham :
300 _axvi, 257 p. ;
_bill., (some col.),
_c25 cm
365 _b74.99
_cEUR
_d94.90
490 _aSynthesis lectures on engineering, science, and technology
504 _aIncludes bibliographical references.
520 _aThis book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.
650 _aComputer security
650 _aCyber-physical systems
650 _aTelecommunication
650 _a Electrical Technology
650 _a3GPP
650 _aCellular network
650 _aCommon Criteria
650 _aCounter measures
650 _aCryptographic keys
650 _aDigital signatures
650 _aFirmware
650 _aHost MCU
650 _aIOT device
650 _a Protection
650 _aPublic-key cryptography
650 _aSecurity MCUs
650 _aSensor
650 _aSide-channel attacks
650 _aSmart card
650 _aSmart meter
650 _aSTMicroelectronics
650 _aTamper
650 _aWatchdog timer
650 _aSESIP
942 _2ddc
_cBK