YoVDO

MQTT and CoAP - A Story about IoT Protocol Security

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses MQTT Courses Encryption Courses Authorization Courses CoAP Courses

Course Description

Overview

Explore the security landscape of IoT protocols in this 36-minute conference talk from LASCON 2015. Delve into the world of Machine-to-Machine (M2M) communications, focusing on MQTT and CoAP protocols designed for constrained devices. Understand why these protocols were developed as alternatives to HTTP for IoT applications. Examine their functionality, associated protocols, and common architectures. Witness demonstrations of potential attacks against these protocols and specific implementations, including device impersonation, system disruption, and remote code execution. Learn mitigation strategies for securing your own code and identify potential vulnerabilities in libraries and frameworks. Gain insights into pseudorandom number generation, DTLS, resource directories, publish-subscribe models, authentication, authorization, and Quality of Service (QoS) in IoT contexts. Enhance your understanding of IoT protocol security to develop more robust and secure real-world systems.

Syllabus

Intro
Why use different protocols
Examples
Pseudorandom number generator
Whats new
CoAP
DTLS
Example
Con
Token Generator
Smooth Reset
What is DTLS
For DTLS
For Encryption
For Multicast
Resource Directory Example
Admin Example
PublishSubscribe Example
Authentication Authorization
QoS
MQTT Topics
MQTT wildcards
TLS
Authorization
Authorization Plugin
Conclusion


Taught by

LASCON

Related Courses

IoT Networking and Fog Layer Devices
ITMO University via edX
A Gentle Introduction to IoT Protocols - MQTT, CoAP, HTTP & WebSockets
GOTO Conferences via YouTube
Comparing Messaging Techniques for IoT
Linux Foundation via YouTube
Connecting Zephyr Devices at Scale Using Open Source Solutions
Linux Foundation via YouTube
Design for Internet of Things
NPTEL via YouTube