Skip to main content
abstract blue background

Education & Training

Login for Access

Description
To facilitate smart applications such as intelligent manufacturing, energy-constrained devices are inter-connected through bandwidth-constrained communication protocols to form the Internet-of-things (IoT). Unfortunately, due to such constraints, the IoT networks fail to employ conventional security protocols, which makes them vulnerable to security threats. On the one hand, the IoT devices are vulnerable to illegal access and inference of sensitive information, while on the other, their users are prone to spoofing attacks through which an attacker can feed malicious data to the user. This makes it indispensable to enhance the robustness of IoT networks, specifically those utilized for security-sensitive applications. In this talk, I will discuss two specific networks: (1) Controller Area Network (CAN) which is a representative wired IoT network connecting different electronic control units within an automobile, and (2) Bluetooth Low Energy (BLE) network which is a representative wireless IoT network connecting wearables to the user’s smartphone. For both these networks, I will describe newly discovered vulnerabilities that can exploited by an attacker to launch an attack without getting detected by the deployed security mechanisms. I will conclude the talk by discussing the adopted methodologies to mitigate the discovered threat.
Presenters
Vireshwar Kumar
ComSoc Member Price
$0.00
IEEE Member Price
$4.99
Non-Member Price
$9.99