Commissioning methods for IoT

Presented at Still Hacking Anyway (SHA2017), Aug. 7, 2017, 11:45 p.m. (30 minutes).

Many of the things we use on a daily basis are becoming smart and connected. The Internet of Things (IoT) will improve our lives by helping us reach our fitness goals, reduce resource consumption, increasing productivity, and track and secure our assets. Many embedded developers realize the potential benefits of the IoT and are actively developing various applications, from connected home devices to wearables to home security systems. However, along with these benefits come risks. No one wants to design an application that’s prone to hacking or data theft. One of the most complicated and crucial trade-offs in IoT security is the commissioning of wireless devices onto a network. This lecture presents a review of common commissioning methods and their security tradeoffs. #IoT #NetworkSecurity

Presenters:

  • Lars Lydersen
    Former quantum hacker, currently security the billions of Internet of Things. Lars Lydersen has a background as a security researcher and was a part of the team that broke into the “unbreakable” commercial quantum cryptographic systems. Since then he has shifted focus to classical embedded security systems, and works as the Sr. Director of Product Security with Silicon Labs. He holds a MsC in Electronics, and a PhD in Quantum Cryptography from the Norwegian University of Science and Technology.

Links:

Similar Presentations: