- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 215字
- 2021-06-10 18:42:23
Cellular communications
LTE—often referred to as 4G cellular—is a popular option for IoT connectivity. In a typical LTE network, User Equipment (UE) such as a smart phone (or an IoT device) contains a USIM that securely stores authentication information. The authentication information stored in the USIM enables authentication with the carrier's Authentication Center (AuC). A symmetric pre-shared key is provisioned to both the USIM (at manufacture time) and the AuC (at subscribe time), which then uses that symmetric key to derive an Access Security Management Entity (ASME). The ASME is used to derive additional keys that encrypt signalling and user communications.
Future 5G communications may offer additional deployment options for IoT systems, based on higher throughput and the ability to support many more connections. This may provide enhanced capabilities for direct connectivity of IoT devices to the cloud and allow for new centralized controller functions to be created that support multitudes of geographically dispersed sensors/actuators with limited infrastructure in place. More robust cellular capabilities will further enable the cloud to be the aggregation point for sensor data feeds, web service interactions, and interfaces to numerous enterprise applications.
There are many communication protocols used by IoT devices besides the ones discussed. The following is a description of some of those other protocols:

- INSTANT Netcat Starter
- Mobile Forensics Cookbook
- Computer Forensics with FTK
- 學(xué)電腦安全與病毒防范
- 情報驅(qū)動應(yīng)急響應(yīng)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- Mastering Linux Security and Hardening
- 一本書讀透金融科技安全
- CCNA Security 210-260 Certification Guide
- 大數(shù)據(jù)安全治理與防范:反欺詐體系建設(shè)
- 深入探索區(qū)塊鏈
- 復(fù)雜網(wǎng)絡(luò)環(huán)境下訪問控制技術(shù)
- Learning Metasploit Exploitation and Development