BLE Authentication Design Challenges on IoT Devices
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the challenges of BLE authentication design for IoT devices in this conference talk from TROOPERS17. Delve into the intricacies of securing Bluetooth Low Energy connections in the Internet of Things ecosystem as presented by experts Shi-Cho Cha and Chen-yu Dai. Gain valuable insights into the complexities of implementing robust authentication mechanisms for resource-constrained IoT devices utilizing BLE technology. Learn about potential vulnerabilities, best practices, and innovative solutions to enhance the security of BLE-enabled IoT products. Understand the importance of balancing security requirements with the limited computational and energy resources of IoT devices. This 50-minute presentation is part of the Building IoT track at the TROOPERS IT-Security Conference, offering cutting-edge knowledge for IoT developers, security professionals, and researchers.
Syllabus
TR17 - BLE Authentication Design Challenges on (...) IoT Devices (...) - Shi-Cho Cha, Chen-yu Dai
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube