CHAPTER 1 Introduction: Securing the Internet of Things CHAPTER 2 Security Architecture in the Internet of Things CHAPTER 3 Security and Vulnerability in the Internet of Things CHAPTER 4 IoT Node Authentication CHAPTER 5 Security Requirements in IoT Architecture CHAPTER 6 Security in Enabling Tech