Avancerad sökning

Visar resultat 1 - 5 av 69 uppsatser som matchar ovanstående sökkriterier.

  1. 1. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Robal Saker; Obaida Abu Issa; [2024]
    Nyckelord :ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Sammanfattning : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. LÄS MER

  2. 2. Designing a Novel RPL Objective Function & Testing RPL Objective Functions Performance

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Khalil Mardini; Emad Abdulsamad; [2023]
    Nyckelord :Routing protocol for low-power and lossy networks RPL ; Wireless Sensor Networks WSN ; The Internet of Things IoT ; Objective Function OF ; Low-Power and Lossy Networks LLNs ; Expected Transmission Count ETX ; Min- imum Rank with Hysteresis Objective Function MRHOF ; Packet Delivery Ratio PDR ; Directed Acyclic Graph DODAG ;

    Sammanfattning : The use of Internet of Things systems has increased to meet the need for smart systems in various fields, such as smart homes, intelligent industries, medical systems, agriculture, and the military. IoT networks are expanding daily to include hundreds and thousands of IoT devices, which transmit information through other linked devices to reach the network sink or gateway. LÄS MER

  3. 3. Development and Implementation Strategies Towards a Comprehensive YANG Model-Based Configuration Data Generation Tool

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Alma Garpenfeldt; Linus Silfver Shahparastan; [2023]
    Nyckelord :YANG modeling language; Configuration management; Network management; Template-based configuration; NETCONF protocol; YANG-modelleringsspråk; Konfigurationshantering; Nätverkshantering; Mall-baserad konfiguration; NETCONF-protokoll;

    Sammanfattning : Effective management and operation of modern networks heavily rely on efficient network configuration management and infrastructure. Manual configuration management has been proven inefficient, and there is a need to automatize it. LÄS MER

  4. 4. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  5. 5. Machine Learning of Laser Ultrasonic Data to Predict Material Properties

    Master-uppsats, Linköpings universitet/Statistik och maskininlärning

    Författare :Filip Tuvenvall; [2023]
    Nyckelord :Machine Learning; Laser Ultrasonics; Material Properties; Steel; Hardness of Steel;

    Sammanfattning : The hardness of steel is an important quality parameter for several industrial applications. Conventional mechanical testing is used in quality testing for material hardness and the method is time-consuming, can cause material mix-ups, and results in material waste. LÄS MER