Workshops & Trainings

Upcoming Workshop / Event Detials
mission

Workshop Name:
Implementation of Security Mechanisms/Protocols with Different Layers of Iot

Organized By:
IoTSec- UETL

Training Outcomes:
Following are the major goals of this training workshop

1. Understanding of Implementation of security mechanisms/protocols with different layers of IoT protocol Understanding security challenges posed by the Internet of Things (IoT) systems, including IoT devices, IoT protocols and their vulnerabilities
2. Understanding of OneM2M Architecture Based Secure MQTT Binding in Mbed OS
3. Understanding of Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices

Date:
16th August 2022 to 18th August 2022

Duration:
3 Days

Mode of Training:
Hybrid

Targeted Audience:
Computer Science (CS) AND Computer Engineering (CE) Students

Payment Category:
Students 5k
Professionals 10k
International $100

Prerequisite Knowledge:
Participants must have the basic knowledge on the following key areas:
Network Security
IoT and IoT security
IoT architecture and its protocols

Technical Content to be Covered:

Talk of Dr. Ali Hammad Akbar + Introduction of oneM2M and IoT Protocol Vulnerabilities
1. OneM2M Introduction
2. OneM2M Architecture Introduction
I. Application Entity
II. Common Service Entity

3. IoT protocols vulnerabilities (Different attack vectors and CVEs)
I. MQTT Introduction
II. MQTT SN Introduction
III. MQTT Vulnerabilities Assessment

a. Improper packet length checks
b. Lack of required fields checks (RFC)
c. Missing logically error checks (LEC)
d. Miscellaneous Vulnerabilities

Demo 1: OneM2M Architecture Based Secure MQTT Binding in Mbed OS

1. Introduction
2. Proposed OneM2M System Architecture
3. Methodology and Implementation
I. MQTT Secure Binding (require certificate, use identity as username) Registration
II. Container, Content Instance and Subscription
III. Use Case Description and Experimentation

Demo 2: MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices

1. Introduction
2. Methodology
I. Security Architecture in oneM2M (Security Functions Layer, Secure Environment Abstraction Layer, Secure Environment Layer)
II. Security Association Establishment Frameworks
III. Implementation (M2M Symmetric Key Configuration, Certificate Configuration, Verification Call back Settings, DoS Attack, Packet Duplicity, Invalid Record, Unreliability, Retransmission Control (RTC))

Registration:
Please Register:

"Register Yourself"