IoT: Building Arduino-Based Projects Front Cover

IoT: Building Arduino-Based Projects

  • Length: 736 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2016-08-31
  • ISBN-10: 1787120635
  • ISBN-13: 9781787120631
  • Sales Rank: #1458230 (See Top 100 Books)
Description

About This Book

  • Learn the capabilities and differences between popular protocols and communication patterns and how they can be used, and should not be used, to create secure and interoperable services and things
  • Build Internet-based Arduino devices to make your home feel more secure
  • Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem
  • Learn best practices to secure your data from device to the cloud

Who This Book Is For

If you’re a developer or electronics engineer who is curious about Internet of Things, then this is the course for you. A rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java will be helpful. Business analysts and managers will also find this course useful.

What You Will Learn

  • Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
  • Use important communication patterns such as request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
  • Build a portable Wi-fisignal strength sensor to give haptic feedback about signal strength to the user
  • Measure water flow speed and volume with liquid flow sensors and record real-time readings
  • Secure your home with motion-activated Arduino security cameras and upload images to the cloud
  • Implement real-time data logging of a solar panel voltage with Arduino cloud connectors
  • Track locations with GPS and upload location data to the cloud
  • Control infrared-enabled devices with IR remote and Arduino
  • Use systems security engineering and Privacy by Design principles to design a secure IoT ecosystem

In Detail

The IoT: Building Arduino-Based Projects course will take you on a journey to become an expert in the use of IoT by developing a set of projects and will guide you through securing your IoT environment.

In the first module, Learning Internet of Things, you will learn how protocols and patterns can put limitations on network topology. You will also learn how the existing protocols, communication patterns, architectures, and security issues are important to Internet of Things.

The second module, Internet of Things with Arduino Blueprints, provides eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users―creating smart, pervasive, and always-connected environments.

It has become critical to ensure that cyber security threats are kept to a minimum when implementing new IoT services and solutions. Thus, our third module, Practical Internet of Things Security provides a set of guidelines to architect and deploy a secure IoT in your enterprise. The aim is to showcase how IoT is implemented in early adopting industries.

Table of Contents

1. Module 1
1. Preparing our IoT Projects
2. The HTTP Protocol
3. The UPnP Protocol
4. The CoAP Protocol
5. The MQTT Protocol
6. The XMPP Protocol
7. Using an IoT Service Platform
8. Creating Protocol Gateways
9. Security and Interoperability

2. Module 2
1. Internet-Controlled PowerSwitch
2. Wi-Fi Signal Strength Reader and Haptic Feedback
3. Internet-Connected Smart Water Meter
4. Arduino Security Camera with Motion Detection
5. Solar Panel Voltage Logging with NearBus Cloud Connector and Xively
6. GPS Location Tracker with Temboo, Twilio, and Google Maps
7. Tweet-a-Light – Twitter-Enabled Electric Light
8. Controlling Infrared Devices Using IR Remote

3. Module 3
1. A Brave New World
2. Vulnerabilities, Attacks, and Countermeasures
3. Security Engineering for IoT Development
4. The IoT Security Lifecycle
5. Cryptographic Fundamentals for IoT Security Engineering
6. Identity and Access Management Solutions for the IoT
7. Mitigating IoT Privacy Concerns
8. Setting Up a Compliance Monitoring Program for the IoT
9. Cloud Security for the IoT
10. IoT Incident Response

To access the link, solve the captcha.