• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Master the Raspberry Pi Pico in C: WiFi with lwIP & mbedtls

Master the Raspberry Pi Pico in C: WiFi with lwIP & mbedtls

Paperback

Programming

ISBN10: 1871962811
ISBN13: 9781871962819
Publisher: Lightning Source Inc
Published: Apr 11 2023
Pages: 234
Weight: 0.91
Height: 0.49 Width: 7.00 Depth: 10.00
Language: English
There is a newer edition of this book Master the Raspberry Pi Pico in C: WiFi with LwIP, MbedTLS & FreeRTOS, Second Edition ISBN-13: 978-1871962987

Adding WiFi to the Raspberry Pi Pico turns this low-cost, small form factor device into a true IoT device. The extra capabilities added to the Pico W open up loads of opportunities, but only if you are prepared to do battle with the two libraries that provide networking and security - lwIP and mbedtls respectively. The problem with these large libraries of code is that they are poorly documented and don't refer directly to the Pico W and its SDK. This book sets out to remedy this by providing a guide to these libraries along with examples of what you can do with them.

Having introduced the Pico WiFi Stack and basic network connections, we look at how to use TCP to create the all-important Protocol Control Block and then tackle implementing an HTTP client. As well as covering the basic mechanics of using lwIP, we also concentrate on how to organize the use of an asynchronous library based on callbacks.

The problem of IoT security is unique because IoT devices can be physically accessed by an attacker and hence any secrets embedded in their code have to be considered almost as public knowledge. Even so it is worth implementing encryption and this is achieved using mbedtls to create an HTTPS client. If you can ensure the physical security of the IoT device, then running it as a server is possible and this is covered in both HTTP and HTTPS modes, complete with certificates. We cover the basics of cryptography, including the problem of generating random numbers, what an encryption suite is and the various modes of AES encryption.

Also from

James, Mike

Also in

Programming