Exploring Embedded Operating Systems for IoT and Tethys Security Solutions

embedded os for iot n.w
1 / 9
Embed
Share

Dive into the world of embedded operating systems for IoT devices and discover the security solutions offered by Tethys. Explore infrastructure-free data transmission, long-term deployment options, and encryption algorithms to secure your IoT ecosystem.

  • IoT Security
  • Embedded OS
  • Tethys Solutions
  • Data Transmission
  • Encryption

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Embedded OS for IoT Tu Le Nov 19, 2018

  2. Tethys Motivation?

  3. Tethys - - - - Infrastructure-free Data at per-fixture granularity Long-term deployment (energy-harvesting) Security & Privacy in data transmission

  4. Tethys Weaknesses?

  5. Tethys - - - Encryption algorithms on low-power Energy consumption in data transmission Bluetooth attack vector

  6. Ditio Motivation?

  7. Ditio - - - - Assures sensor activities systematically Assurance for both owner and 3rd party Takes advantages of trusted zones and provides legacy version Security & Privacy in data transmission

  8. Ditio Weaknesses?

  9. Ditio - - Client-server communication attack vectors (MITM) Deployment challenges (legacy devices, modification to system software, etc.) Sealing on low-power User experience - -

More Related Content