YoVDO

Hunting the Sigfox - Wireless IoT Network Security

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses Cryptography Courses Wireless Security Courses

Course Description

Overview

Explore the security implications of Sigfox, a low-power wide-area network technology for IoT devices, in this 38-minute conference talk from the 35th Chaos Communication Congress. Dive deep into the radio protocol analysis, including the dissection of uplink and downlink structures, and learn about the open reference implementation of an alternative Sigfox protocol stack. Discover why certain applications may be suitable for Sigfox while others should be avoided. Gain insights into radio technology basics, protocol analysis techniques, and potential security vulnerabilities. Understand the importance of independent security audits for proprietary protocols and explore suggestions for improving Sigfox's security. Suitable for a technical audience with basic cryptography knowledge, this talk provides valuable information on IoT network security without requiring extensive RF technology expertise.

Syllabus

35C3 - Hunting the Sigfox: Wireless IoT Network Security


Taught by

media.ccc.de

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera