SEI Cyber Minute: Safely Using IoT at the Edge
• Video
This research will help ensure the security and effectiveness of IoT devices in tactical environments.
Publisher
Software Engineering Institute
Topic or Tag
Watch
Abstract
This work addresses high-priority threats of tactical environments, such as node impersonation & capture, operates in situations with limited network connectivity, and considers resource constraints of IoT devices. This research will help ensure the security and effectiveness of IoT devices in tactical environments.