Overview
Explore the security landscape of IoT protocols in this 36-minute conference talk from LASCON 2015. Delve into the world of Machine-to-Machine (M2M) communications, focusing on MQTT and CoAP protocols designed for constrained devices. Understand why these protocols were developed as alternatives to HTTP for IoT applications. Examine their functionality, associated protocols, and common architectures. Witness demonstrations of potential attacks against these protocols and specific implementations, including device impersonation, system disruption, and remote code execution. Learn mitigation strategies for securing your own code and identify potential vulnerabilities in libraries and frameworks. Gain insights into pseudorandom number generation, DTLS, resource directories, publish-subscribe models, authentication, authorization, and Quality of Service (QoS) in IoT contexts. Enhance your understanding of IoT protocol security to develop more robust and secure real-world systems.
Syllabus
Intro
Why use different protocols
Examples
Pseudorandom number generator
Whats new
CoAP
DTLS
Example
Con
Token Generator
Smooth Reset
What is DTLS
For DTLS
For Encryption
For Multicast
Resource Directory Example
Admin Example
PublishSubscribe Example
Authentication Authorization
QoS
MQTT Topics
MQTT wildcards
TLS
Authorization
Authorization Plugin
Conclusion
Taught by
LASCON