Chapter 9. Share: Securing and sharing web Things

 

This chapter covers

  • A short overview of security risks and issues on the Web of Things
  • A brief theoretical introduction to HTTPS, certificates, and encryption
  • Best practices and techniques for web-based authorization and access control
  • Learning to implement these best practices and tools on your Raspberry Pi
  • Implementing the Social Web of Things in the WoT gateway

In most cases, Internet of Things deployments involve a group of devices that communicate with each other or with various applications within closed networks—rarely over open networks such as the internet. It would be fair to call such deployments the “intranets of Things” because they’re essentially isolated, private networks that only a few entities can access. But the real power of the Web of Things lies in opening up these lonely silos and facilitating interconnection between devices and applications at a large scale.

9.1. Securing Things

9.2. Authentication and access control

9.3. The Social Web of Things

9.4. Beyond the book

9.5. Summary