CERTIFICATES AND SIGNATURES: How to Ensure Authentication in the IoT
TBMG-26489
03/01/2017
- Content
On October 21, 2016, the Internet saw a significant distributed denial of service (DDoS) attack, conducted via a botnet comprising many co-opted Internet-connected devices. The attackers of the network infrastructure were able to control these Internet-of-Things (IoT) devices for a number of reasons, including a lack of strong authentication. Loaded software turned the machines into puppets that interfered with Internet traffic for millions of users.
- Citation
- "CERTIFICATES AND SIGNATURES: How to Ensure Authentication in the IoT," Mobility Engineering, March 1, 2017.