Localization and Security in IoT
Everyone
- 17 videos | 1h 53m 9s
- Includes Assessment
Learn about localization and security in the Internet of Things.
WHAT YOU WILL LEARN
-
Know what you will learn about localization in this courseKnow how to formulate the localization problemKnow how sensing can better localizationKnow how to use triangulation to compute the location of an objectUnderstand the algorithm presentedUnderstand the outdoor localization case studyUnderstand how to overcome the limitations of the algorithm presentedUnderstand the indoor localization case studySummarize what you learned in the previous videos
-
Understand why security is a challenging problemKnow about the diversity of threat models that face iot designersKnow how to create systems that are secure against powerful adversariesUnderstand the prevention mechanism known as physical unclonable functionsUnderstand the prevention mechanism known as physical unclonable functionsUnderstand how the trusted computing base allows us to continue working under attackKnow how to use a secure processor to solve the encrypted computation problemUnderstand the third mechanism to produce secure iot systems
IN THIS COURSE
-
3m 17sFind out what you are going to learn about localization in the following videos. FREE ACCESS
-
2m 20sLearn about the formulation of the localization problem FREE ACCESS
-
6m 48sFind out how we can do better for localization FREE ACCESS
-
6m 51sFind out how to use triangulation FREE ACCESS
-
11m 7sLearn about an algorithm that is guaranteed to copute a robust localization solution FREE ACCESS
-
8m 35sLearn more about outdoor localization through this case study FREE ACCESS
-
6m 13sFind out how to overcome the limitations of the algorithm presented FREE ACCESS
-
5m 33sLearn more about indoor localization through this case study FREE ACCESS
-
3m 24sWrap up everything learned in the videos about localization FREE ACCESS
-
9m 58sLearn why security, especially in IoT, is such a challenging problem FREE ACCESS
-
5m 34s
-
5m 8sFind out how to create systems that are secure against powerful adversaries FREE ACCESS
-
11m 21sLearn about Physical Unclonable Functions FREE ACCESS
-
9m 32sLearn more about Physical Unclonable Functions FREE ACCESS
-
6m 11sLearn about a second mechanism that corresponds to resilience under attack FREE ACCESS
-
5m 17sLearn about usina a secure processor to solve the encrypted computation problem FREE ACCESS
-
6mFind out a third way to produce secure IoT systems FREE ACCESS
YOU MIGHT ALSO LIKE
Channel
Wintellect Application Security