2014/04/23
23 Apr, 2014

Securing IoT Applications - Wednesday, April 23, 2014

  • Mohamed Usama Mansoor
  • Lead - Revenue Operations - WSO2
Archived Content
This article is provided for historical perspective only, and may not reflect current conditions. Please refer to relevant product page for more up-to-date product information and resources.

Enterprises are recognizing the growing risk around security and privacy of IoT devices and M2M interactions. This session will examine the security challenges around using M2M interactions with protocols, such as Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). It will discuss how to secure MQTT with Transport Layer Security (TLS), the challenges with Arduino, and the use of hardware encryption for micro controllers.

In this webinar Paul Fremantle, Co-Founder and CTO at WSO2 will also cover

  • Privacy requirements for user-centric IoT device use cases to strengthen data collection and sharing practices.
  • How to apply protocols such as OAuth 2.0, OpenID Connect, and User-Managed Access (UMA) to the M2M world to enable a privacy-respecting user consent and authorization model.
  • Demonstration of Arduino and Eclipse Paho inter-operating secured by OAuth 2.0
Presenter
Paul Fremantle Co-founder & CTO, WSO2 Paul co-founded WSO2 in 2005 in order to reinvent the way enterprise middleware is developed, sold, delivered and supported through an open source model. In his current role as CTO, he spearheads WSO2’s overall product strategy. Previously, he served as WSO2 vice president of technical sales where he led the development of the groundbreaking WSO2 Enterprise Service Bus. In 2008, Paul was recognized by InfoWorld among the Top 25 CTOs.
Share
 

About Author

  • Mohamed Usama Mansoor
  • Lead - Revenue Operations
  • WSO2