This session discusses the history and high-level design of IoT applications, including the emerging design pattern known as Edge Computing. We will discuss the role that Public Key Infrastructure (PKI) plays in abuse prevention in IoT applications, and how various implementations of PKI-based authentication can make complex applications more resistant to abuse. The session concludes with a discussion of current standards initiatives and open-source projects related to Iot and Edge Computing, which will enable complex applications to safely evolve beyond the manual rituals of IoT application care and feeding, to a securely automated future.
