YoVDO

BLE Authentication Design Challenges on IoT Devices

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses IoT security Courses

Course Description

Overview

Explore the challenges of BLE authentication design for IoT devices in this conference talk from TROOPERS17. Delve into the intricacies of securing Bluetooth Low Energy connections in the Internet of Things ecosystem as presented by experts Shi-Cho Cha and Chen-yu Dai. Gain valuable insights into the complexities of implementing robust authentication mechanisms for resource-constrained IoT devices utilizing BLE technology. Learn about potential vulnerabilities, best practices, and innovative solutions to enhance the security of BLE-enabled IoT products. Understand the importance of balancing security requirements with the limited computational and energy resources of IoT devices. This 50-minute presentation is part of the Building IoT track at the TROOPERS IT-Security Conference, offering cutting-edge knowledge for IoT developers, security professionals, and researchers.

Syllabus

TR17 - BLE Authentication Design Challenges on (...) IoT Devices (...) - Shi-Cho Cha, Chen-yu Dai


Taught by

WEareTROOPERS

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam