Sökning: "constrained devices"

Visar resultat 21 - 25 av 128 uppsatser innehållade orden constrained devices.

  1. 21. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Nikolaos Georgiou; [2023]
    Nyckelord :ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Sammanfattning : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. LÄS MER

  2. 22. Implementing and evaluating variations of the Blackhole attack on RPL

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Adam Pettersson; [2022]
    Nyckelord :;

    Sammanfattning : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. LÄS MER

  3. 23. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Sarmed Almjamai; [2022]
    Nyckelord :Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER

  4. 24. Sustainable IoT Data Caching Policy using Deep Reinforcement Learning

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Hanna Woldeselassie Ogbazghi; [2022]
    Nyckelord :IoT; Sustainability; caching; DRL; Performance; Optimization; Evaluation;

    Sammanfattning :  Over the years, the Internet of Things has grown significantly and integrated into many fields such as medicine, agriculture, smart homes, etc. This growth has resulted in a significant increase in the amount of data generated. LÄS MER

  5. 25. Online Sample Selection for Resource Constrained Networked Systems

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Philip Sjösvärd; Samuel Miksits; [2022]
    Nyckelord :Online learning; Sample Selection; Real-time Learning; Random Forest; Reservoir Sampling; Relevance and Redundancy; Binned Distribution; Autoregressive Model; Change Detection; Model Re-computation;

    Sammanfattning : As more devices with different service requirements become connected to networked systems, such as Internet of Things (IoT) devices, maintaining quality of service becomes increasingly difficult. Large data sets can be obtained ahead of time in networks to train prediction models offline, however, resulting in high computational costs. LÄS MER