IoT protocols exist that provide several different functions, including 6LowPAN for connectivity, mDNS for device discovery, MQTT and CoAP for constrained devices, and IPv6 for identification.
- [Instructor] Developers early on felt that…low-powered IoT devices with limited processing capabilities…had to be able to communicate with other devices.…TCP/IP is instrumental in moving data through networks…and the Internet, but we also need other protocols…to move IoT data within constrained networks.…For objects on the IoT, several protocols exist…that provide different functions…such as connectivity, service discovery, and identification.…
IP version six is a building block for devices…to be able to communicate.…It allows addressing, routing,…and global Internet connectivity to be a reality.…6LoWPAN is an abbreviation for IP version six…and Low-Powered Wireless Personal Area Networks.…This allows for even the tiniest devices…with limited processing the ability to transmit information…wirelessly using IP version six.…
Multicast DNS.…With DNS-Based Service Discovery,…clients can find the list of desired services…using standard DNS queries.…DNS Service Discovery with multicast is similar,…except it uses multicast.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.