
Exploring Embedded Operating Systems for IoT and Tethys Security Solutions
Dive into the world of embedded operating systems for IoT devices and discover the security solutions offered by Tethys. Explore infrastructure-free data transmission, long-term deployment options, and encryption algorithms to secure your IoT ecosystem.
Uploaded on | 0 Views
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Embedded OS for IoT Tu Le Nov 19, 2018
Tethys Motivation?
Tethys - - - - Infrastructure-free Data at per-fixture granularity Long-term deployment (energy-harvesting) Security & Privacy in data transmission
Tethys Weaknesses?
Tethys - - - Encryption algorithms on low-power Energy consumption in data transmission Bluetooth attack vector
Ditio Motivation?
Ditio - - - - Assures sensor activities systematically Assurance for both owner and 3rd party Takes advantages of trusted zones and provides legacy version Security & Privacy in data transmission
Ditio Weaknesses?
Ditio - - Client-server communication attack vectors (MITM) Deployment challenges (legacy devices, modification to system software, etc.) Sealing on low-power User experience - -