Sökning: "MitM"

Visar resultat 1 - 5 av 18 uppsatser innehållade ordet MitM.

  1. 1. Penetration testing of Sesame Smart door lock

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Shuyuan Liu; [2023]
    Nyckelord :IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Sammanfattning : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. LÄS MER

  2. 2. Internet of Things i smarta hemmet : En systematisk litteraturstudie för att kartlägga attackmetoder och verktyg

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Tommy Nylén; [2023]
    Nyckelord :IoT; Internet of Things; smarta hemmet; attack; metod; verktyg; IoT; Internet of Things; smart home; attack; method; tools;

    Sammanfattning : Senaste åren har Internet of Things (IoT) haft en explosionsartad utveckling. En underkategori till IoT är det smarta hemmet, där smarta enheter kopplas samman med ett nätverk. Flera exempel på smarta enheter är smarta lampor, termostater, dörrlås, säkerhetskameror, smarta kylskåp och smarta tvättmaskiner. LÄS MER

  3. 3. Edge Computing Security for IoT : A Systematic Literature Review

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Albin Johnsson; Adam Nordling; [2023]
    Nyckelord :;

    Sammanfattning : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. LÄS MER

  4. 4. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Nyckelord :Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Sammanfattning : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. LÄS MER

  5. 5. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Sarmed Almjamai; [2022]
    Nyckelord :Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER