12 Securing IoT communications
- Securing IoT communications with Datagram TLS
- Choosing appropriate cryptographic algorithms for constrained devices
- Implementing end-to-end security for IoT APIs
- Distributing and managing device keys
12.1 Transport layer security
12.1.2 Cipher suites for constrained devices
12.2.1 Implementing a PSK server
12.2.3 Supporting raw PSK cipher suites
12.2.4 PSK with forward secrecy
12.3.2 Alternatives to COSE
12.3.3 Misuse-resistant authenticated encryption
12.4 Key distribution and management
12.4.1 One-off key provisioning
12.4.2 Key distribution servers
12.4.3 Ratcheting for forward secrecy
12.4.4 Post-compromise security
Answers to pop quiz questions