Flexible Authentication Methods for Secure IoT Device Connections

Flexible Authentication Methods for Secure IoT Device Connections

Introduction: Flexible Authentication/Authorization Mechanisms Provide Efficient Security Assurance EMQX has always placed great emphasis on security, providing continuous enhancement of security guarantees for IoT users through a wide range of out-of-the-box security features, including MQTT over TLS/SSL, transmission encryption and authentication integration based on national cryptography algorithms, as well as various identity authentication functions such … Read more

Analysis of Bluetooth Security Vulnerabilities and Attack Methods

Analysis of Bluetooth Security Vulnerabilities and Attack Methods

Analysis of Bluetooth Technology’s Security Vulnerabilities and Attack Methods In current network applications, the Internet of Things (IoT) has a ubiquitous demand for diversity, low cost, low rate, and short distance. Such demands are mainly realized through low-speed network protocols like Bluetooth. Bluetooth is an open standard for short-range communication, utilizing embedded chips to achieve … Read more

Tips for High-Scale MQTT Messaging with EMQ

Tips for High-Scale MQTT Messaging with EMQ

If the number of devices reaches one million, the database will have to handle two million authentication records, which will significantly affect the database’s performance. Is there a batch way to define ACL authentication? 1. ACL Authentication Rules Under normal business usage, the behavior of clients can be restricted using ACL. For example, Client A … Read more

Analysis of Rails 8 Authentication Implementation (1) – Theoretical Preparation

Analysis of Rails 8 Authentication Implementation (1) - Theoretical Preparation

Ten days ago, 37signals published an article: A vanilla Rails stack is plenty, this article reinforced my long-standing belief: If Rails provides a solution, it’s best to stick with Rails’ solution. Maintaining minimal dependencies and reducing upgrade barriers is certainly important; more importantly, it is to learn the “optimal solution” after top developers think and … Read more

Understanding User Authentication in Web Applications

Understanding User Authentication in Web Applications

https://thecopenhagenbook.com/ Server-side tokens A server-side token is any long, random string that is stored on the server. It may be persisted in a database or in-memory data store (e.g. Redis) and is used for authentication and verification. A token can be validated by checking if it exists in storage. Examples include session IDs, email verification … Read more