search menu icon-carat-right cmu-wordmark

SEI Cyber Minute: Safely Using IoT at the Edge

January 2018 Video
Grace Lewis

This research will help ensure the security and effectiveness of IoT devices in tactical environments.

Publisher:

Software Engineering Institute

Watch

Abstract

This work addresses high-priority threats of tactical environments, such as node impersonation & capture, operates in situations with limited network connectivity, and considers resource constraints of IoT devices. This research will help ensure the security and effectiveness of IoT devices in tactical environments.