From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,400 courses taught by industry experts.

Encryption

Encryption

Hi, I'm Matthew Clark. And this is Lesson 4.5: Encryption. In this video, we're going to discuss the role of identity, including identity considerations and lifecycle. We're going to discuss trust anchors and cryptography, including symmetric and asymmetric encryption. Let's start by talking about the relationship between identification and authentication. Identification is a requirement for authentication. You simply cannot authenticate what you cannot first identify, and authentication proves an identity assertion. This is where identity management comes into play. Identity management is important to being able to protect IoT devices and the other components in the IoT system by having a secure manner in order to prove the identity. Proving identity requires protecting credentials regardless of the type of identity used or credentials that are used. In our previous lesson, we conducted a case study of an IoT smart home hub where identity was nothing more than the serial number and…

Contents