Hunting the Sigfox - Wireless IoT Network Security
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore the security implications of Sigfox, a low-power wide-area network technology for IoT devices, in this 38-minute conference talk from the 35th Chaos Communication Congress. Dive deep into the radio protocol analysis, including the dissection of uplink and downlink structures, and learn about the open reference implementation of an alternative Sigfox protocol stack. Discover why certain applications may be suitable for Sigfox while others should be avoided. Gain insights into radio technology basics, protocol analysis techniques, and potential security vulnerabilities. Understand the importance of independent security audits for proprietary protocols and explore suggestions for improving Sigfox's security. Suitable for a technical audience with basic cryptography knowledge, this talk provides valuable information on IoT network security without requiring extensive RF technology expertise.
Syllabus
35C3 - Hunting the Sigfox: Wireless IoT Network Security
Taught by
media.ccc.de
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera