MQTT and CoAP - A Story about IoT Protocol Security
Offered By: LASCON via YouTube
Course Description
Overview
Explore the security landscape of IoT protocols in this 36-minute conference talk from LASCON 2015. Delve into the world of Machine-to-Machine (M2M) communications, focusing on MQTT and CoAP protocols designed for constrained devices. Understand why these protocols were developed as alternatives to HTTP for IoT applications. Examine their functionality, associated protocols, and common architectures. Witness demonstrations of potential attacks against these protocols and specific implementations, including device impersonation, system disruption, and remote code execution. Learn mitigation strategies for securing your own code and identify potential vulnerabilities in libraries and frameworks. Gain insights into pseudorandom number generation, DTLS, resource directories, publish-subscribe models, authentication, authorization, and Quality of Service (QoS) in IoT contexts. Enhance your understanding of IoT protocol security to develop more robust and secure real-world systems.
Syllabus
Intro
Why use different protocols
Examples
Pseudorandom number generator
Whats new
CoAP
DTLS
Example
Con
Token Generator
Smooth Reset
What is DTLS
For DTLS
For Encryption
For Multicast
Resource Directory Example
Admin Example
PublishSubscribe Example
Authentication Authorization
QoS
MQTT Topics
MQTT wildcards
TLS
Authorization
Authorization Plugin
Conclusion
Taught by
LASCON
Related Courses
IoT Networking and Fog Layer DevicesITMO University via edX A Gentle Introduction to IoT Protocols - MQTT, CoAP, HTTP & WebSockets
GOTO Conferences via YouTube Comparing Messaging Techniques for IoT
Linux Foundation via YouTube Connecting Zephyr Devices at Scale Using Open Source Solutions
Linux Foundation via YouTube Design for Internet of Things
NPTEL via YouTube