action image header it logic

Strengthening IoT Security: The Crucial Role of Authentication

Strong authentication is crucial for IoT device security, vital for data exchange, control, and lifecycle management.

Topic

Endpoint ProtectionIdentity and access managementIndustry 4.0 / IoT / Edge Computing

When & Where

calendar_month

Tue, 10/22/2024, 16:20 - 16:30

location_on

Forum, Booth 6-235

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

When it comes to IoT device security we believe proper and robust authentication is the
corner stone of any software security stack to be further developed on the device. Before you
want to send data to or receive data from the sensors of a IoT device, before you want to
control its critical actuators to perform, sometimes even life defining operations, we believe
you first want to have strongly authenticated the device with which you believe you are
communicating or controlling. This is valid for the operational aspect of an IoT device during
its life-time, but equally important for the provisioning and decommissioning. Certificates
and PKI infrastructure appears to be the “go-to solution” for IoT device authentication, bu ...

Speaker

Moderator

external video thumbnail