I attended Mbed Connect 2018 in San Jose and talked about the role of standards for IoT security. My co-worker Jan Jongboom provided a nice summary in this blog post “It’s a wrap: Mbed Connect US 2018 is done”. I stayed there for the entire event and was surprised about
Category: smart objects
Internet of Things Software Update Workshop (IoTSU)
We are organizing another workshop on Internet of Things related matters. This time we will talk about the importance of software / firmware updates. We are seeking input on this topic via the workshop. The workshop webpage also provides examples for topics, such as: Protocol mechanisms for distributing software updates:
Internet of Things (IoT) Semantic Interoperability Workshop 2016
Today’s Internet of Things deployments are not known for their great interoperability. Typically, devices are only able to speak to one specific gateway, app downloaded from the device vendor, or to a single cloud provider. Getting devices from different vendors to talk to each other is challenging. The reason for
OMA LWM2M Tutorial
Last week Simon Lemay and I gave a tutorial about the Lightweight Machine-to-Machine (LWM2M) standard developed by the Open Mobile Alliance (OMA) to participants from the IETF ACE working group. LWM2M offers several features that are relevant for Internet of Things security and also for the work in the IETF
OAuth 2.0 for Internet of Things
During the second week of November 2015 ARM TechCon took place in Santa Clara/California. The event is packed with presentations (from ARM and from partners) and new technology gets announced, such as the TrustZone for v8-M architecture. TrustZone for v8-M brings TrustZone functionality, which was previously available only to Cortex
Internet of Things (IoT) Crypto Performance Investigation
Earlier this year I presented some performance results to the IETF LWIG working group. Here is the slide deck I presented to the community. The slides are also available for download. The idea of my presentation at the Dallas IETF meeting was to get others to enhance the performance investigations to
Smart Object Architectures
Dave Thaler, Mary Barnes, and I had the honor to talk to the participants of the IETF#92 meeting in Dallas/Texas about the recently published Smart Object Architecture document, see RFC 7452. The presentation was given during the technical plenary of the Internet Architecture Board (IAB). A recording of the talk was
Webinar about the Kantara User-Managed Access (UMA) working group to the IETF ACE Working Group
[UPDATED: 14. January 2015] Early 2014 we organized a couple of webinars to hear about technologies that allowed to provide authentication of Internet of Things devices and to control access to resources. We learned more about OAuth, Kerberos, and the PKI/certificate model and all talks have been recorded and can be found
Webinar about “How to Select Hardware for Internet of Things Systems?”
Various groups in the IETF currently standardize technology for use with constrained devices and the choice of hardware impacts the design of Internet of Things (IoT) systems. To provide guidance RFC 7228 “Terminology for Constrained-Node Networks” defines three classes of devices depending on their RAM and flash memory size. Class
ACE BOF & Tutorials (about Kerberos, PKI, AAA, OAuth, and ABFAB)
At the last IETF meeting early March in London I had the pleasure to co-chair the Authentication and Authorization for Constrained Environments (ace) BOF with Kepeng. The picture of the flyer we distributed during the meeting should give you a rough idea what the topic is about. (We are also