Essays about: "IIoT devices"
Showing result 1 - 5 of 21 essays containing the words IIoT devices.
-
1. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
2. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
3. Development of AI/ML Methods for Advanced Device Localization in Beyond 5G Systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This master thesis aims to investigate the positioning accuracy improvements of device localization by the implementation of AI/ML functionalities. In this project, we use the fifth-generation(5G) New Radio (NR) system and focus on indoor factories. READ MORE
-
4. Preparing for the Unexpected : Guidelines for Industrial IoT Forensics Readiness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Industrial Internet of Things (IIoT) plays a critical role in modern industrial systems, contributing to increased efficiency, productivity, and innovation. However,its rapid evolution and the complexity of devices pose significant challenges to digital forensics readiness (DFR). READ MORE
-
5. Comparison between consensus algorithms in an IIoT network : Analysis of Proof of Work, Proof of Stake and Proof of Authentication
University essay from KTH/Hälsoinformatik och logistikAbstract : The Industrial Internet of Things (IIoT) is growing day by day and is implemented in many industries. The centralized architecture of an IIoT system is composed of several devices that communicate with a special device only via one link, in an instance where this one link is attacked, major problems could occur for the whole system. READ MORE