YoVDO

BLE Authentication Design Challenges on IoT Devices

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses IoT security Courses

Course Description

Overview

Explore the challenges of BLE authentication design for IoT devices in this conference talk from TROOPERS17. Delve into the intricacies of securing Bluetooth Low Energy connections in the Internet of Things ecosystem as presented by experts Shi-Cho Cha and Chen-yu Dai. Gain valuable insights into the complexities of implementing robust authentication mechanisms for resource-constrained IoT devices utilizing BLE technology. Learn about potential vulnerabilities, best practices, and innovative solutions to enhance the security of BLE-enabled IoT products. Understand the importance of balancing security requirements with the limited computational and energy resources of IoT devices. This 50-minute presentation is part of the Building IoT track at the TROOPERS IT-Security Conference, offering cutting-edge knowledge for IoT developers, security professionals, and researchers.

Syllabus

TR17 - BLE Authentication Design Challenges on (...) IoT Devices (...) - Shi-Cho Cha, Chen-yu Dai


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube