Localization and Security in IoT

Everyone
  • 17 videos | 1h 53m 9s
  • Includes Assessment
Learn about localization and security in the Internet of Things.

WHAT YOU WILL LEARN

  • Know what you will learn about localization in this course
    Know how to formulate the localization problem
    Know how sensing can better localization
    Know how to use triangulation to compute the location of an object
    Understand the algorithm presented
    Understand the outdoor localization case study
    Understand how to overcome the limitations of the algorithm presented
    Understand the indoor localization case study
    Summarize what you learned in the previous videos
  • Understand why security is a challenging problem
    Know about the diversity of threat models that face iot designers
    Know how to create systems that are secure against powerful adversaries
    Understand the prevention mechanism known as physical unclonable functions
    Understand the prevention mechanism known as physical unclonable functions
    Understand how the trusted computing base allows us to continue working under attack
    Know how to use a secure processor to solve the encrypted computation problem
    Understand the third mechanism to produce secure iot systems

IN THIS COURSE

  • 3m 17s
    Find out what you are going to learn about localization in the following videos. FREE ACCESS
  • 2m 20s
    Learn about the formulation of the localization problem FREE ACCESS
  • Locked
    3.  Localization Video 2 Part 2
    6m 48s
    Find out how we can do better for localization FREE ACCESS
  • Locked
    4.  Localization Video 2 Part 3
    6m 51s
    Find out how to use triangulation FREE ACCESS
  • Locked
    5.  Localization Video 3
    11m 7s
    Learn about an algorithm that is guaranteed to copute a robust localization solution FREE ACCESS
  • Locked
    6.  Localization Video 4 Part 1
    8m 35s
    Learn more about outdoor localization through this case study FREE ACCESS
  • Locked
    7.  Localization Video 4 Part 2
    6m 13s
    Find out how to overcome the limitations of the algorithm presented FREE ACCESS
  • Locked
    8.  Localization Video 5
    5m 33s
    Learn more about indoor localization through this case study FREE ACCESS
  • Locked
    9.  Localization Video 6
    3m 24s
    Wrap up everything learned in the videos about localization FREE ACCESS
  • Locked
    10.  Security In IoT Video 1
    9m 58s
    Learn why security, especially in IoT, is such a challenging problem FREE ACCESS
  • Locked
    11.  Security In IoT Video 2
    5m 34s
  • Locked
    12.  Security In IoT Video 3 Part 1
    5m 8s
    Find out how to create systems that are secure against powerful adversaries FREE ACCESS
  • Locked
    13.  Security In IoT Video 3 Part 2
    11m 21s
    Learn about Physical Unclonable Functions FREE ACCESS
  • Locked
    14.  Security In IoT Video 3 Part 3
    9m 32s
    Learn more about Physical Unclonable Functions FREE ACCESS
  • Locked
    15.  Security In IoT Video 4 Part 1
    6m 11s
    Learn about a second mechanism that corresponds to resilience under attack FREE ACCESS
  • Locked
    16.  Security In IoT Video 4 Part 2
    5m 17s
    Learn about usina a secure processor to solve the encrypted computation problem FREE ACCESS
  • Locked
    17.  Security In IoT Video 5
    6m
    Find out a third way to produce secure IoT systems FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 2.0 of 1 users Rating 2.0 of 1 users (1)