calender
Date & Time
Search
Datum
{{range.dates[index].day}}
{{range.dates[index].date}}
Time
Mornings Noon Afternoons Evenings
  • from
  • to
  • o'clock
Topic
Event
Properties
{{item.name}}
{{item.name}}
Exhibition venue

(please choose the desired areas)

Lecture language
Format

Event database

The event database contains all event-related information for the digital electronica conference and supporting event program.

Back to the EventList

Embedded Security - How Can I Protect My Wireless IoT Devices

NOV
12
2020
12. NOV 2020

Lecture electronica Conferences > Wireless Congress > Session 11: Security

14:00-14:25 h | Virtual

Unprotected IoT devices are an easy target for cyber attacks. The presentation shows the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple Wi-Fi based sensor illustrates how the latest generation of Secure Microcontrollers with Trusted Execution Environments (TEE) and Secure Elements can be used to securely store key material and perform cryptographic operations in an energy-efficient way. Hardware and software components work together with a Public Key Infrastructure (PKI) to securely connect a low-power wireless sensor to a cloud. More detailed background: The presentation targets product developers who connect their wireless embedded devices to cloud systems. It communicates the following key messages 1. If you do not protect your devices, you will be an easy target. We will show how a Raspberry Pi is enough to perform an attack on an unprotected demo system. 2. It introduces a systematic process to identify your threats, derive requirements and implement countermeasures specifically for your application. 3. It shows available hardware, firmware and software components as well as organizational issues (like PKI) to implement effective countermeasures. The presentation shows how the authors have applied these components in the presented demo system.

Subjects: Wireless

Speaker: Prof. Andreas Ruest (ZHAW InES)

Type: Lecture

Speech: English

Notifiable

Chargeable

Login

Unprotected IoT devices are an easy target for cyber attacks. The presentation shows the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple Wi-Fi based sensor illustrates how the latest generation of Secure Microcontrollers with Trusted Execution Environments (TEE) and Secure Elements can be used to securely store key material and perform cryptographic operations in an energy-efficient way. Hardware and software components work together with a Public Key Infrastructure (PKI) to securely connect a low-power wireless sensor to a cloud. More detailed background: The presentation targets product developers who connect their wireless embedded devices to cloud systems. It communicates the following key messages 1. If you do not protect your devices, you will be an easy target. We will show how a Raspberry Pi is enough to perform an attack on an unprotected demo system. 2. It introduces a systematic process to identify your threats, derive requirements and implement countermeasures specifically for your application. 3. It shows available hardware, firmware and software components as well as organizational issues (like PKI) to implement effective countermeasures. The presentation shows how the authors have applied these components in the presented demo system.

Speaker,
ZHAW InES

Prof. Andreas Ruest

Prof. Andreas Ruest

ZHAW InES

Show Profile

Informations

Speaker,
ZHAW InES

Prof. Andreas Ruest
Prof. Andreas Ruest

More Events