Security protocols and security layers (TLS, Wi-Fi, and Bluetooth)
Module duration: 4 hours
​
Module overview
​
Transport Layer Security (TLS) is the protocol employed on the Internet to protect communications. Wi-Fi and Bluetooth are the two most widespread technologies of wireless connectivity. These technologies provide some security schemes, but they have also been subjected to many attacks in the past. In this module, we present the goals of these protocols and the points where they have shown weaknesses.
Objective of this module
The main purpose of this module is to give a deep understanding of TLS and the security connection protocol used on the internet. Alongside that, two other security protocols are presented, i.e., Bluetooth and Wi-Fi, to acquire a broader knowledge of how two (or more) IoT devices can securely communicate with each other.
What you will learn:
01.
How the main secure protocols work
02.
What a public key infrastructure and certificates are
03.
Which vulnerabilities can be detected in products using those protocols
04.
Some attacks against secure protocols
You will cover:
This module aims to show most common security protocols, giving a description of them.
​
HTTPS
• HTTP protocol and its secure version HTTPS, with encrypted communication
• Protocol architecture and its security weaknesses
​
TLS
• Overview of the TLS protocol
• Public Key Infrastructure and certificates
• Application level authentication
​
Bluetooth
• Overview of the protocol and its security
• BT, BLE and BT Mesh
• Vulnerabilities on products that use Bluetooth
​
Wi-Fi
• Overview of Wi-Fi protocol versions (WEP, WPA”, WPA3)
• Drill down: WPA2 protocol design and security weaknesses
This module is
intended for:
This module is intended for professionals who need to have a thorough understanding of how secure protocols work and are used. Additionally, it provides several examples of secure protocol applications to help the participants better comprehend.