
Strengthening IoT Security: The Crucial Role of Authentication
Strong authentication is crucial for IoT device security, vital for data exchange, control, and lifecycle management.
Topic
Endpoint ProtectionIdentity and access managementIndustry 4.0 / IoT / Edge Computing
When & Where
Details
Format:
Technology lecture
Session description
When it comes to IoT device security we believe proper and robust authentication is the
corner stone of any software security stack to be further developed on the device. Before you
want to send data to or receive data from the sensors of a IoT device, before you want to
control its critical actuators to perform, sometimes even life defining operations, we believe
you first want to have strongly authenticated the device with which you believe you are
communicating or controlling. This is valid for the operational aspect of an IoT device during
its life-time, but equally important for the provisioning and decommissioning. Certificates
and PKI infrastructure appears to be the “go-to solution” for IoT device authentication, bu ...
corner stone of any software security stack to be further developed on the device. Before you
want to send data to or receive data from the sensors of a IoT device, before you want to
control its critical actuators to perform, sometimes even life defining operations, we believe
you first want to have strongly authenticated the device with which you believe you are
communicating or controlling. This is valid for the operational aspect of an IoT device during
its life-time, but equally important for the provisioning and decommissioning. Certificates
and PKI infrastructure appears to be the “go-to solution” for IoT device authentication, bu ...
Speaker
Moderator
