Главная
Study mode:
on
1
Intro
2
Why use different protocols
3
Examples
4
Pseudorandom number generator
5
Whats new
6
CoAP
7
DTLS
8
Example
9
Con
10
Token Generator
11
Smooth Reset
12
What is DTLS
13
For DTLS
14
For Encryption
15
For Multicast
16
Resource Directory Example
17
Admin Example
18
PublishSubscribe Example
19
Authentication Authorization
20
QoS
21
MQTT Topics
22
MQTT wildcards
23
TLS
24
Authorization
25
Authorization Plugin
26
Conclusion
Description:
Explore the security landscape of IoT protocols in this 36-minute conference talk from LASCON 2015. Delve into the world of Machine-to-Machine (M2M) communications, focusing on MQTT and CoAP protocols designed for constrained devices. Understand why these protocols were developed as alternatives to HTTP for IoT applications. Examine their functionality, associated protocols, and common architectures. Witness demonstrations of potential attacks against these protocols and specific implementations, including device impersonation, system disruption, and remote code execution. Learn mitigation strategies for securing your own code and identify potential vulnerabilities in libraries and frameworks. Gain insights into pseudorandom number generation, DTLS, resource directories, publish-subscribe models, authentication, authorization, and Quality of Service (QoS) in IoT contexts. Enhance your understanding of IoT protocol security to develop more robust and secure real-world systems.

MQTT and CoAP - A Story about IoT Protocol Security

LASCON
Add to list