Mohammd Reza Geramiariyagerami.hashnode.dev·Jul 25, 2024Authentication methods for Internet of Things (IoT) devicesExploring the most effective authentication methods for Internet of Things (IoT) devices is an ongoing journey filled with research and debate. Here are some popular and efficient methods worth considering: 1. Lightweight Authentication Protocols: ...Discuss·1 likeIoT security
circuit talescircuit-tales.tech·Jul 18, 2024A Step-by-Step Guide to ESP32 OTA Updates with OTA DriveKeeping your IoT devices up-to-date is crucial for performance and security. Over-the-Air (OTA) updates offer a seamless way to deploy firmware updates to your ESP32 devices without physical access. In this guide, we will explore how to use the OTA D...Discuss·46 readsESP32 Development SeriesOTAUpdates
Harmanjeetharmanjeet.hashnode.dev·Jul 14, 2024IoT Security in the Era of 5GIn the ever-evolving landscape of technology, the integration of IoT (Internet of Things) devices has ushered in a new era of interconnectedness and efficiency. With the advent of 5G technology, promising unprecedented speed and connectivity, the pot...DiscussIoT security
Raicode.flatmarstheory.com·Jun 1, 2024Data Poisoning in AIAs Artificial Intelligence (AI) systems become more prevalent in various sectors, the integrity of the data used to train these systems is paramount. One of the emerging threats to AI models is data poisoning, a malicious attack that aims to corrupt ...DiscussData Poisoning
Quantum Cyber Solutionsqcs.hashnode.dev·May 10, 2024Can You Trust Autonomous Vehicles: Contactless Attacks Against Sensors of Self-driving VehiclesPublished on Friday, May 10, 2024 Can You Trust Autonomous Vehicles: Contactless Attacks Against Sensors of Self-driving Vehicles =================================================================================================== Authors Name Elon ...DiscussAutomotive Technology
Quantum Cyber Solutionsqcs.hashnode.dev·May 10, 2024Can You Trust Autonomous Vehicles: Contactless Attacks Against Sensors of Self-driving VehiclesPublished on Friday, May 10, 2024 Can You Trust Autonomous Vehicles: Contactless Attacks Against Sensors of Self-driving Vehicles =================================================================================================== Authors Name Elon ...DiscussAutomotive Technology
Jiyajiyajha.hashnode.dev·May 2, 2024Guardians of Connectivity: Exploring the World of IoT CybersecurityInternet of Things cybersecurity, or IoT cybersecurity, is a tactic to defend networks and devices connected to the internet against cyberattacks. Internet of Things (IoT) devices are network-connected items such as WiFi-enabled autos, smart refriger...Discuss#IoTProtection
Allex Christianchristini.hashnode.dev·Mar 22, 2024Hands-On IoT Building Your First Application from Scratch in 2024Introduction Now, let’s turn the theory into practice! Building your first IoT application is a fantastic way to grasp the potential of the Internet of Things. By creating a simple project, you’ll gain hands-on experience with sensors, data collectio...DiscussIoT security
Sumit Mondalsumit007.hashnode.dev·Feb 13, 2024Navigating the Seas of Connectivity: A Simple Guide to Amazon IoT FleetWise in AWSIntroduction: In the vast ocean of the Internet of Things (IoT), managing fleets of devices efficiently is crucial for smooth sailing. Amazon IoT FleetWise in AWS is your compass in this journey, offering a streamlined approach to monitor, update, an...DiscussAWS - HandsOn #FleetWise
Sumit Mondalsumit007.hashnode.dev·Feb 12, 2024A Beginner's Guide to Securing Your IoT Devices with Amazon IoT Device Defender in AWSIn the fast-paced world of Internet of Things (IoT), security is paramount. With the increasing number of connected devices, it becomes crucial to safeguard your IoT ecosystem. Fortunately, Amazon Web Services (AWS) provides a robust solution for sec...DiscussAWS - HandsOn#DeviceDefender