Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

MQTT and CoAP - A Story about IoT Protocol Security

LASCON via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security landscape of IoT protocols in this 36-minute conference talk from LASCON 2015. Delve into the world of Machine-to-Machine (M2M) communications, focusing on MQTT and CoAP protocols designed for constrained devices. Understand why these protocols were developed as alternatives to HTTP for IoT applications. Examine their functionality, associated protocols, and common architectures. Witness demonstrations of potential attacks against these protocols and specific implementations, including device impersonation, system disruption, and remote code execution. Learn mitigation strategies for securing your own code and identify potential vulnerabilities in libraries and frameworks. Gain insights into pseudorandom number generation, DTLS, resource directories, publish-subscribe models, authentication, authorization, and Quality of Service (QoS) in IoT contexts. Enhance your understanding of IoT protocol security to develop more robust and secure real-world systems.

Syllabus

Intro
Why use different protocols
Examples
Pseudorandom number generator
Whats new
CoAP
DTLS
Example
Con
Token Generator
Smooth Reset
What is DTLS
For DTLS
For Encryption
For Multicast
Resource Directory Example
Admin Example
PublishSubscribe Example
Authentication Authorization
QoS
MQTT Topics
MQTT wildcards
TLS
Authorization
Authorization Plugin
Conclusion

Taught by

LASCON

Reviews

Start your review of MQTT and CoAP - A Story about IoT Protocol Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.