Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

BLE Authentication Design Challenges on IoT Devices

WEareTROOPERS via YouTube

Overview

Explore the challenges of BLE authentication design for IoT devices in this conference talk from TROOPERS17. Delve into the intricacies of securing Bluetooth Low Energy connections in the Internet of Things ecosystem as presented by experts Shi-Cho Cha and Chen-yu Dai. Gain valuable insights into the complexities of implementing robust authentication mechanisms for resource-constrained IoT devices utilizing BLE technology. Learn about potential vulnerabilities, best practices, and innovative solutions to enhance the security of BLE-enabled IoT products. Understand the importance of balancing security requirements with the limited computational and energy resources of IoT devices. This 50-minute presentation is part of the Building IoT track at the TROOPERS IT-Security Conference, offering cutting-edge knowledge for IoT developers, security professionals, and researchers.

Syllabus

TR17 - BLE Authentication Design Challenges on (...) IoT Devices (...) - Shi-Cho Cha, Chen-yu Dai

Taught by

WEareTROOPERS

Reviews

Start your review of BLE Authentication Design Challenges on IoT Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.