Loading Events

« All Events

  • This event has passed.

5GCroCo Lunchtime Webinar 5: Security Guideline for MQTT Protocol

May 17, 2021 @ 12:00 pm - 1:30 pm CEST

Lunchtime Webinar Nr.5 

Welcome to the 5th in a planned series of 5GCroco Lunchtime Webinars.  These webinars will address different aspects of the technical work of the 5GCroco project in detail with some time for questions and discussions on the work presented.

AGENDA:

 Security Guideline for MQTT Protocol

Section 4.5.2 “Security Guideline for MQTT Protocol” of the recently published 5GCroCo Deliverable D3.2 on “Intermediate E2E, MEC & Positioning Architecture” describes ways to put security into the “publish/subsribe messaging protocol”, that was designed 1999 for machine to machine telemetry in low bandwidth environments for TCP/IP networks.

MQTT started as a proprietary protocol, it was released royalty free in 2010 and became OASIS standard in 2014. MQTT stands for Message Queuing Telemetry Transport and was fast becoming one of the main protocols of IOT (internet of things) deployments. MQTT v3.1.1 is in common use, the new version MQTT v5 has been approved in Jan 1018 and is currently in limited use.

The presentation shows methods to put security into MQTT v3.1.1 protocol and pinpoints the advantages and disadvantages for each case that is pictured.

As preparation we suggest reading Section 4.5.2 of 5GCroCo Deliverable D3.2 on https://5gcroco.eu/images/templates/rsvario/images/5GCroCo_D3_2.pdf

SPEAKER:

Erik Wegscheider was engaged in military projects (DOD-STD-2167A) and was working most of the time for customers with attentions in data security (PII-data, health data).

He has more than 25 years’ security experience with IT-Network architecture with deep Knowledge of IP (LAN- and WAN-protocols), in particular with Firewalls and security appliances, best practice with security in data centers and some years field experience as auditor for IT-Security-Audits.

He has successfully completed a lot of certifications, such as from Cisco (Firewalls, Router, Switches), Microsoft (MCP, MCSA, MCSE) and the Practitioner Certificate Information Assurance Architecture (PCiIAA).

REGISTRATION:

Error: Contact form not found.

Details

Date:
May 17, 2021
Time:
12:00 pm - 1:30 pm CEST

Venue

Organizer

ICT Proposers Days

Lunchtime Webinar Nr.5 

Welcome to the 5th in a planned series of 5GCroco Lunchtime Webinars.  These webinars will address different aspects of the technical work of the 5GCroco project in detail with some time for questions and discussions on the work presented.

AGENDA:

 Security Guideline for MQTT Protocol

Section 4.5.2 “Security Guideline for MQTT Protocol” of the recently published 5GCroCo Deliverable D3.2 on “Intermediate E2E, MEC & Positioning Architecture” describes ways to put security into the “publish/subsribe messaging protocol”, that was designed 1999 for machine to machine telemetry in low bandwidth environments for TCP/IP networks.

MQTT started as a proprietary protocol, it was released royalty free in 2010 and became OASIS standard in 2014. MQTT stands for Message Queuing Telemetry Transport and was fast becoming one of the main protocols of IOT (internet of things) deployments. MQTT v3.1.1 is in common use, the new version MQTT v5 has been approved in Jan 1018 and is currently in limited use.

The presentation shows methods to put security into MQTT v3.1.1 protocol and pinpoints the advantages and disadvantages for each case that is pictured.

As preparation we suggest reading Section 4.5.2 of 5GCroCo Deliverable D3.2 on https://5gcroco.eu/images/templates/rsvario/images/5GCroCo_D3_2.pdf

SPEAKER:

Erik Wegscheider was engaged in military projects (DOD-STD-2167A) and was working most of the time for customers with attentions in data security (PII-data, health data).

He has more than 25 years’ security experience with IT-Network architecture with deep Knowledge of IP (LAN- and WAN-protocols), in particular with Firewalls and security appliances, best practice with security in data centers and some years field experience as auditor for IT-Security-Audits.

He has successfully completed a lot of certifications, such as from Cisco (Firewalls, Router, Switches), Microsoft (MCP, MCSA, MCSE) and the Practitioner Certificate Information Assurance Architecture (PCiIAA).

REGISTRATION:

Error: Contact form not found.

Details

Date:
May 24, 2021
Time:
12:00 pm - 1:30 pm CEST

Venue

Organizer

ICT Proposers Days
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.