Chapter 1: Preparing our IoT Projects
Creating the sensor project
Creating the actuator project
Chapter 2: The HTTP Protocol
Adding HTTP support to the sensor
Adding HTTP support to the actuator
Adding HTTP support to the controller
Chapter 3: The UPnP Protocol
Creating a device description document
Creating the service description document
Providing a web interface
Creating a UPnP interface
Implementing the Still Image service
Chapter 4: The CoAP Protocol
Adding CoAP to our sensor
Adding CoAP to our actuator
Using CoAP in our controller
Chapter 5: The MQTT Protocol
Publishing and subscribing
Adding MQTT support to the sensor
Adding MQTT support to the actuator
Adding MQTT support to the controller
Chapter 6: The XMPP Protocol
Adding XMPP support to a thing
Providing an additional layer of security
Adding XMPP support to the actuator
Adding XMPP support to the camera
Adding XMPP support to the controller
Connecting it all together
Chapter 7: Using an IoT Service Platform
Selecting an IoT platform
Interfacing our devices using XMPP
Creating our control application
Chapter 8: Creating Protocol Gateways
Understanding protocol bridging
Using an abstraction model
The basics of the Clayster abstraction model
Understanding the CoAP gateway architecture
Chapter 9: Security and Interoperability
Tools for achieving security
The need for interoperability
Chapter 10: Internet-Controlled PowerSwitch
Selecting a PowerSwitch Tail
Turning PowerSwitch Tail into a simple web server
Adding a Cascade Style Sheet to the web user interface
Finding the MAC address and obtaining a valid IP address
Chapter 11: Wi-Fi Signal Strength Reader and Haptic Feedback
Wi-Fi signal strength and RSSI
Haptic feedback and haptic motors
Implementing a simple web server
Chapter 12: Internet-Connected Smart Water Meter
Adding an LCD screen to the water meter
Converting your water meter to a web server
Chapter 13: Arduino Security Camera with Motion Detection
Getting started with TTL Serial Camera
Connecting the TTL Serial Camera with Arduino and Ethernet Shield
Uploading images to Flickr
Chapter 14: Solar Panel Voltage Logging with NearBus Cloud Connector and Xively
Connecting a solar cell with the Arduino Ethernet board
Setting up a NearBus account
Creating and configuring a Xively account
Configuring the NearBus connected device for Xively
Developing a web page to display the real-time voltage values
Chapter 15: GPS Location Tracker with Temboo, Twilio, and Google Maps
Hardware and software requirements
Getting started with the Arduino GPS shield
Connecting the Arduino GPS shield with the Arduino Ethernet board
Getting started with Twilio
Creating Twilio Choreo with Temboo
Chapter 16: Tweet-a-Light – Twitter-Enabled Electric Light
Hardware and software requirements
Getting started with Python
Creating a Twitter app and obtaining API keys
Reading the serial data using Arduino
Chapter 17: Controlling Infrared Devices Using IR Remote
Building an Arduino infrared recorder and remote
Building the IR receiver module
Adding an IR socket to non-IR enabled devices
Chapter 18: A Brave New World
Why cross-industry collaboration is vital
The IoT in the enterprise
The IoT of the future and the need to secure
Chapter 19: Vulnerabilities, Attacks, and Countermeasures
Primer on threats, vulnerability, and risks (TVR)
Primer on attacks and countermeasures
Lessons learned and systematic approaches
Chapter 20: Security Engineering for IoT Development
Building security in to design and development
Chapter 21: The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Chapter 22: Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Chapter 23: Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
Authentication credentials
Authorization and access control
Chapter 24: Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
Privacy engineering recommendations
Chapter 25: Setting Up a Compliance Monitoring Program for the IoT
A complex compliance environment
Chapter 26: Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Chapter 27: IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response