chapter twelve

12 Securing IoT communications

 

This chapter covers

  • Securing IoT communications with Datagram TLS
  • Choosing appropriate cryptographic algorithms for constrained devices
  • Implementing end-to-end security for IoT APIs
  • Distributing and managing device keys

12.1        Transport layer security

12.1.1                  Datagram TLS

12.1.2                  Cipher suites for constrained devices

12.2        Pre-shared keys

12.2.1                  Implementing a PSK server

12.2.2                  The PSK client

12.2.3                  Supporting raw PSK cipher suites

12.2.4                  PSK with forward secrecy

12.3        End-to-end security

12.3.1                  COSE

12.3.2                  Alternatives to COSE

12.3.3                  Misuse-resistant authenticated encryption

12.4        Key distribution and management

12.4.1                  One-off key provisioning

12.4.2                  Key distribution servers

12.4.3                  Ratcheting for forward secrecy

12.4.4                  Post-compromise security

12.5        Summary