Essays about: "IoT authentication"

Showing result 16 - 20 of 37 essays containing the words IoT authentication.

  1. 16. Enhancing Zigbee Security for Industrial Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamza Kadhum; [2020]
    Keywords : Zigbee network security; LoWPAN; IoT; Wireless Sensor Network; Node lifetime; Zigbee nätverk säkerhet; LoWPAN; IoT; Trådlöst Sensornätverk; Sensornodens livslängd;

    Abstract : Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. READ MORE

  2. 17. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  3. 18. Tiny Security : Evaluating energy   use for security in an IoT application

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Mårten Söderquist; [2019]
    Keywords : Security; constrained device; AES; IoT; sensors; AEAD; ATmega1284P; ACORN128;

    Abstract : IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. READ MORE

  4. 19. Implementation and evaluationof the ACE DTLS framework : Reducing the authentication workload of a constrained device

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jacob Johansson; [2019]
    Keywords : IoT; ACE; 6LoWPAN;

    Abstract : IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is increasing rapidly. It is starting to become normal to have IoT-devices takingover mundane jobs such as controlling the climate at home, or monitoring e.g the water us-age of a household. READ MORE

  5. 20. What Are the Security Challenges Concerning Maintenance Data in the Railway Industry

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Hiba Khan; [2019]
    Keywords : Cloud Computing; Railway; Identification; Internet Of Things; Authorization; Authentication.;

    Abstract : Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. READ MORE