Sökning: "IoT devices"
Visar resultat 6 - 10 av 558 uppsatser innehållade orden IoT devices.
6. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. LÄS MER
7. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. LÄS MER
8. A cybersecurity audit of the Garmin Venu
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. LÄS MER
9. Extending energy attack mitigation to multiple IoT devices
Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/DatorteknikSammanfattning : A subset of IoT devices in use today rely on energy harvesting technologies for power. This means that rather than being connected to a larger energy grid or using batteries these devices source their energy from their environment, for example by using solar cells. LÄS MER
10. Profile Based Access Control Model Using JSON Web Tokens
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER