"This white paper discusses smart object applications and relevant threats, evaluates various approaches to securing against specific threats, offers some practical guidelines for building security into smart object networks, and tackles some common misconceptions about securing these devices."
Kurt Stammberger and Monique Semp, Mocana; M. B. Anand, Eka Systems, Inc.; David Culler, University of California, Berkeley
Page 1: Introduction to security for smart object networks - Part 1: The smart object security problem
Page 2: Smart Object Apps that Require Security
Page 3: The CIA Triad: Confidentiality, Integrity, Availability
Page 4: The Smart Object Security Problem
Page 5: Key Management... Without Public Key Cryptography
Page 6: Common Attacks & Countermeasures
Page 7: Enabling Smart Object Security: IEEE 802.15.4 "6LoWPAN"