Advanced search

Showing result 1 - 5 of 37 essays matching the above criteria.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  2. 2. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  3. 3. IoT and smart grid : Communication security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : John Halldén; [2023]
    Keywords : ;

    Abstract : Electrical grids are a part of the critical infrastructure that society is reliant on for the running of everyday operations. The nature of the electrical grids results in them being located in different locations throughout the country to provide their services. READ MORE

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 5. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE