Essays about: "IoT authentication"

Showing result 11 - 15 of 37 essays containing the words IoT authentication.

  1. 11. What are the Problems with Implementing Blockchain Technology for Decentralized IoT Authentication : A Systematic Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Kortzon; [2020]
    Keywords : Internet of things; blockchain technology; authentication;

    Abstract : The implementation of internet of things is plagued by problems such as security and scalability. It is a very heterogeneous environment and overcoming these hurdles is therefore not an easy feat. A concept of using the decentralized and secure nature of the blockchain technology to combat these problems have been identified. READ MORE

  2. 12. Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Batuhan Ceylan; [2020]
    Keywords : security; medical device; penetration testing; web application; IoT; säkerhet; medicinsk IoT; penetrationstest; webbapplikation;

    Abstract : Computing technology has been getting more reliable and cheaper every year for the past several decades. Consequently, IoT devices have now become a part of medical technology. One example of this is a new open-source technology that has emerged for type-1 diabetes patients, which regulates the patients’ blood glucose levels. READ MORE

  3. 13. Internet of Things : Systematic literature review of security and future research

    University essay from Uppsala universitet/Informationssystem

    Author : Muhammad Aqeel; [2020]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is the network of billions of devices, people and services to Interconnect and exchange information and useful data. The IoT applications are highly affirming to increase the level of comfort, efficiency and automations for the user. READ MORE

  4. 14. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michael Henriksson; [2020]
    Keywords : Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE

  5. 15. Building Datagram Transport Layer Security (DTLS)-based access control in the Internet-of-Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chenxi Feng; [2020]
    Keywords : ;

    Abstract : With the widespread use of the Internet of Things (IoT), the security problem has raised social attention. Due to the limited calculation ability of the constrained device, it is difficult to download the defense software inside and the device just can use the built-in encryption mechanisms to defend attack. READ MORE