search menu icon-carat-right cmu-wordmark

SEI Cyber Minute: Safely Using IoT at the Edge

Video
This research will help ensure the security and effectiveness of IoT devices in tactical environments.
Publisher

Software Engineering Institute

Watch

Abstract

This work addresses high-priority threats of tactical environments, such as node impersonation & capture, operates in situations with limited network connectivity, and considers resource constraints of IoT devices. This research will help ensure the security and effectiveness of IoT devices in tactical environments.