Description
Demystifying Internet of Things Security
Chapter 1: Conceptualizing the Internet of Things
Chapter 2: IoT Frameworks and Complexity Hiding
Chapter 3: Base Platform Security Hardware Building Blocks Chapter 4: IoT Software Security Building Blocks Chapter 5: Connectivity Technologies for IoT
Chapter 6: IoT Vertical Applications and Associated Security Requirements
Author: Sunil Cheruvu, Anil Kumar, Ned Smith
Publisher: Apress
Published: 08/14/2019
Pages: 488
Binding Type: Paperback
Weight: 1.59lbs
Size: 9.21h x 6.14w x 1.05d
ISBN13: 9781484228951
ISBN10: 1484228952
BISAC Categories:
- Computers | Networking | Hardware
- Computers | Security | General
- Business & Economics | Information Management
About the Author
Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform.
Ned joined Intel Labs in 1995 where he helped define the Common Data Security Architecture (CDSA) that was standardized by the Open Group. He chaired the Infrastructure Workgroup (IWG) in the Trusted Computing Group (TCG) from its inception until 2006. The IWG may best be known for its work on Network Access Control (NAC) standards that later became the Trusted Network Connect (TNC) working group within the TCG. The TNC standards were adopted by a majority of network security vendors supplying NAC products.
Ned has been highly influential within Intel having contributed to a long list of enterprise and office security technologies including Intel(R) Identity Protection Technology, Intel(R) Anti-theft Technology, Intel(R) Manageability Engine, Intel(R) Converged Security Engine, Intel(R) Trusted Execution Technology, Intel(R) Insider(TM), Intel(R) Virtualization Technology, Intel(R) Deep Defender(TM), Intel(R) Platform Trust Technology, Intel(R) Software Guard Extensions and numerous other security, privacy, identity and access management related projects.
Ned is a prolific inventor having received Intel's highest award for patent filing in 2014. He has more than 115 patents granted and over 290 patents pending.
Dave Wheeler is a Senior Principal Engineer in the Platform Security Division of IAGS at Intel Corporation and has thirty years' experience in software, security and networking. In his current role, Dave is responsible for research and development of new cryptographic algorithms and protocols, security APIs and libraries across Intel including for IoT platforms, performs security reviews on Intel's cryptographic implementations, and represents Intel at the IETF. Within the Internet of Things, Dave has contributed to Intel's Software-Defined Industrial Systems architecture and IOTG's Health Application Platform. Prior to Intel, Dave held various lead software and systems architecture positions at Motorola, Honeywell Bull, General Dynamics, as well as his own consulting firm. Dave has designed and built several hardware security engines, including a Type-2 security coprocessor for a software defined radio, and the Intel Wireless Trust Module, a hardware cryptographic coprocessor on the Intel XScale processor. He has implemented several cryptographic libraries and protocol layers, including an IPSec-type implementation for an SDR radio, header compression protocol layers for IP, TCP, and UDP over multicast, a connectionless network layer protocol, two-factor authentication verification over RADIUS for a firewall VPN, PPP for serial, an instant messaging protocol over Bluetooth, and many others. Dave has been a key contributor to other full-stack product implementations including Intel's Blue River Network appliance, several complete public Internet applications in PHP, JavaScript/Sails, and even VBScript. Dave has also worked on smartcard security for banking and gaming applications at a startup, Touch Technology. While at Motorola in 1992, Dave authored the "Security Association Management Protocol" for the National Security Agency, and subsequently spoke nationally about key management and key management protocols. He has led clean-room implementations for ISAKMP, IKEv2, and a custom network-keying protocol. Dave's extensive experience in security, networking, software and hardware is leveraged across a broad segment of Intel's Internet of Things to make Intel's products and software projects secure.