calender
Date & Time
Search
Datum
{{range.dates[index].day}}
{{range.dates[index].date}}
Time
Mornings Noon Afternoons Evenings
  • from
  • to
  • o'clock
Topic
Event
Properties
{{item.name}}
{{item.name}}
Exhibition venue

(please choose the desired areas)

Lecture language
Format

Event database

The event database contains all event-related information for the digital electronica conference and supporting event program.

Back to the EventList

Embedded Security - How Can I Protect My Wireless IoT Devices

NOV
12
2020
12. NOV 2020

Lecture electronica Conferences > Wireless Congress > Session 11: Security

14:00-14:25 h | Virtual

Unprotected IoT devices are an easy target for cyber attacks. The presentation shows the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple Wi-Fi based sensor illustrates how the latest generation of Secure Microcontrollers with Trusted Execution Environments (TEE) and Secure Elements can be used to securely store key material and perform cryptographic operations in an energy-efficient way. Hardware and software components work together with a Public Key Infrastructure (PKI) to securely connect a low-power wireless sensor to a cloud. More detailed background: The presentation targets product developers who connect their wireless embedded devices to cloud systems. It communicates the following key messages 1. If you do not protect your devices, you will be an easy target. We will show how a Raspberry Pi is enough to perform an attack on an unprotected demo system. 2. It introduces a systematic process to identify your threats, derive requirements and implement countermeasures specifically for your application. 3. It shows available hardware, firmware and software components as well as organizational issues (like PKI) to implement effective countermeasures. The presentation shows how the authors have applied these components in the presented demo system.

Subjects: Wireless

Speaker: Prof. Andreas Ruest (ZHAW InES)

Type: Lecture

Speech: English

Notifiable

Chargeable

Login

Unprotected IoT devices are an easy target for cyber attacks. The presentation shows the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple Wi-Fi based sensor illustrates how the latest generation of Secure Microcontrollers with Trusted Execution Environments (TEE) and Secure Elements can be used to securely store key material and perform cryptographic operations in an energy-efficient way. Hardware and software components work together with a Public Key Infrastructure (PKI) to securely connect a low-power wireless sensor to a cloud. More detailed background: The presentation targets product developers who connect their wireless embedded devices to cloud systems. It communicates the following key messages 1. If you do not protect your devices, you will be an easy target. We will show how a Raspberry Pi is enough to perform an attack on an unprotected demo system. 2. It introduces a systematic process to identify your threats, derive requirements and implement countermeasures specifically for your application. 3. It shows available hardware, firmware and software components as well as organizational issues (like PKI) to implement effective countermeasures. The presentation shows how the authors have applied these components in the presented demo system.

Speaker,
ZHAW InES

Prof. Andreas Ruest

Prof. Andreas Ruest

ZHAW InES

Show Profile

Informations

Speaker,
ZHAW InES

Prof. Andreas Ruest
Prof. Andreas Ruest

Location

Eingang
Nord-West
ICM
Eingang
Nord
Eingang
West
Atrium
Eingang
Nord-Ost
Eingang
Ost
Conference
Center Nord
Freigelände
C1
C2
C3
C4
C5
C6
B0
B1
B2
B3
B4
B5
B6
A1
A2
A3
A4
A5
A6

More Events