How about this?
Title: Security protocols in constrained environments
Abstract: implementation of security protocols such as TLS, SSH or IPsec come with a memory and compute overhead. Whilst this has become negligible in full scale environments it's still a real issue for hobbyist and embedded developers. This presentation will look at the sources of the overheads, what can be done to minimise them, and what sort of hardware platforms can be made to absorb them. The benefits and potential pitfalls of hardware specific implementations will also be examined.
Bio: Chris Swan is CTO at CohesiveFT where he helps build secure cloud based networks. He's previously been a security guy at large Swiss banks, and before that was a Weapon Engineering Officer in the Royal Navy. Chris has tinkered with electronics since pre school, and these days has a desk littered with various dev boards and projects.
-- Chris
On 5 January 2014 10:57, Andrew Back arback@computer.org wrote:
On 5 January 2014 09:10, Chris Swan chris.swan@iee.org wrote:
If you're still looking for a third speaker then I could maybe work something up on the challenges of doing security protocols like TLS/SSH/IPsec in resource constrained environments.
Sounds good! I can see this could be a particular concern with sensor networks, where lack of appropriate security could give away a lot about you, e.g. movements, what you're doing and so on.
Do you think you might be able to send across a talk, brief abstract and current bio in the next couple of days or so?
Best,
Andrew
oshug mailing list oshug@oshug.org http://oshug.org/cgi-bin/mailman/listinfo/oshug