About This Book
- Learn the capabilities and differences between popular protocols and communication patterns and how they can be used, and should not be used, to create secure and interoperable services and things
- Build Internet-based Arduino devices to make your home feel more secure
- Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem
- Learn best practices to secure your data from device to the cloud
Who This Book Is For
If you're a developer or electronics engineer who is curious about Internet of Things, then this is the course for you. A rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java will be helpful. Business analysts and managers will also find this course useful.
What You Will Learn
- Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
- Use important communication patterns such as request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
- Build a portable Wi-fisignal strength sensor to give haptic feedback about signal strength to the user
- Measure water flow speed and volume with liquid flow sensors and record real-time readings
- Secure your home with motion-activated Arduino security cameras and upload images to the cloud
- Implement real-time data logging of a solar panel voltage with Arduino cloud connectors
- Track locations with GPS and upload location data to the cloud
- Control infrared-enabled devices with IR remote and Arduino
- Use systems security engineering and Privacy by Design principles to design a secure IoT ecosystem
The IoT: Building Arduino-Based Projects course will take you on a journey to become an expert in the use of IoT by developing a set of projects and will guide you through securing your IoT environment.
In the first module, Learning Internet of Things, you will learn how protocols and patterns can put limitations on network topology. You will also learn how the existing protocols, communication patterns, architectures, and security issues are important to Internet of Things.
The second module, Internet of Things with Arduino Blueprints, provides eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users―creating smart, pervasive, and always-connected environments.
It has become critical to ensure that cyber security threats are kept to a minimum when implementing new IoT services and solutions. Thus, our third module, Practical Internet of Things Security provides a set of guidelines to architect and deploy a secure IoT in your enterprise. The aim is to showcase how IoT is implemented in early adopting industries.