Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.
Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions
What You’ll Learn
- Secure devices, immunizing them against different threats originating from inside and outside the network
- Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms
- Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth
Who This Book Is For
Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
Read more

Luiz Carlos –
Excelente conteúdo
Major Strees –
Gave me a basic understanding of IoT security
todd cramer –
Full disclaimer- I work with the authors as the Intel marketing lead for IoT security. However, I felt compelled to write this review because it is bar none the best content available on the subject. Security through the added protections of hardware is widely recognized as THE best practice for IoT security. However, even experts have difficulty keeping up with all the capabilities from silicon providers like Intel and Arm. The authors present the full range of capabilities available with unique insights on the tradeoffs that device designers and security experts need to comprehend. I consider myself an expert, but this book really opened my eyes to how everything can be applied at a system level. If you are in a business or technical role for IoT..this is a must read. Presents the cutting edge of IoT security patterns against the landscape of hardware security features. I consider this book a real weapon against the bad guys. – Todd Cramer
Always Amazon –
Great book!
R. Core –
Overall this is a well written and insightful book on IOT Security. If you are a software engineer or systems engineer involved in the development of networked devices this will be a useful reference guide whether or not your work directly involves security.
The reason I did not give this book 5 stars is twofold. First the book appears to be a series of separately written articles which were converted to chapters in the book. This approach increases the repetition and detracts from the overall readability of the book. Second there is a lot of information in the first two chapters which have little value from a security perspective and add a significant amount of detail which is not relevant to the remainder of the book. While this information might be interesting of useful to some designers it did not seem to add significantly to the reader’s insight into the security of internet devices.
Chapters 3 and 4 were more on point for a book on security and seemed to flow together much better than the other chapters. If you want an overview of approaches being used to integrate security into your platforms these chapters deserve most of your attention. The writing is crisp, on point with a significant amount of detail allowing the reader to understand the approaches, rationale and tradeoffs. I ended up reading these chapters twice to pick up details I missed in the first reading and it was well worth the effort.
Unfortunately Chapter 5 once again diverges from the main topic of the book (i.e. security) and discusses networking technologies with little reference to security. It was an interesting read since it was an area I was not well versed in but did not seem to fit with the title of the book.
So while I heartily recommend this book I would think many readers could skip directly to chapters 3 and 4 and return to chapters 1, 2 and 5 later if you have interests in those subjects.