Sökning: "IoT security management"

Visar resultat 1 - 5 av 47 uppsatser innehållade orden IoT security management.

  1. 1. Prestandajämförelse mellan krypterade och okrypterade tidsseriedatabaser med IoT-baserad temperatur- och geopositionsdata

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Sinem Uzunel; Joanna Xu; [2024]
    Nyckelord :AWS Timestream; InfluxDB Cloud; Performance Testing; Time Series; Time Series databases; Encryption; Database Query; Internet of Things IoT ; Performance Analysis; AWS Timestream; InfluxDB Cloud; Prestandatest; Tidsserier; Tidsseriedatabas; Kryptering; Databasfråga; Internet of Things IoT ; Prestandaanalys;

    Sammanfattning : Internet of Things (IoT) är en växande teknologi som spelar en allt större roll i samhället. Den innefattar ett nätverk av internetanslutna enheter som samlar in och utbyter data. Samtidigt som IoT växer uppstår utmaningar kring hantering av stora datamängder och säkerhetsaspekter. LÄS MER

  2. 2. Digitalization and Electrification´s Transformational Impact on the Automotive Mobility Industry - A multiple case study on the Swedish automotive mobility industry facing changing business models, challenges, and future opportunities

    Master-uppsats, Göteborgs universitet/Graduate School

    Författare :Max Guron; [2023-07-19]
    Nyckelord :Digitalization; Electrification; Business model; Business model framework; Business model innovation; Technological Change; Industrial Change; Disruptive technology; Automotive Mobility; Automotive Industry; Mobility services; Car-sharing; Automotive manufacturers; Car-sharing providers; ride-hailing providers;

    Sammanfattning : The automotive mobility industry, including car manufactures, car-sharing, and ride-hailing companies, is experiencing technological change through electrification and digitalization. These two trends can potentially disrupt the whole industry through, i.e. LÄS MER

  3. 3. Attack Surface Management : Principles for simplifying the complexity of OT security

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Jyotirmay Veshne; [2023]
    Nyckelord :OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Sammanfattning : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. LÄS MER

  4. 4. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    Uppsats för yrkesexamina på grundnivå, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Krister Georges; Per Jahnstedt; [2023]
    Nyckelord :NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Sammanfattning : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. LÄS MER

  5. 5. Securing LwM2M with Mbed TLS in Contiki-NG

    Magister-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Jayendra Ellamathy; [2023]
    Nyckelord :;

    Sammanfattning : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. LÄS MER