Essays about: "IoT authentication"
Showing result 6 - 10 of 37 essays containing the words IoT authentication.
-
6. Password Security Assessment of IoT-Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of the IoT (Internet of Things) and the integration of connected devices into our households, IoT security is becoming more important. This technology allows the user to accomplish tasks and store information in a more effective way. READ MORE
-
7. PUF-enabled blockchain for IoT security : A comparative study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The introduction of Physical Unclonable Functions (PUFs) and lightweight consensus algorithms to aid in the bolstering of security and privacy in both IoT and IoE does show a great deal of promise not only in these areas, but in resource cost over traditional methods of blockchain. However, several previous studies make claims regarding performance of novel solutions without providing detailed information as to the physical components of their experiments. READ MORE
-
8. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE
-
9. Enhancing IoT Security Using 5G Capabilities
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially. READ MORE
-
10. Consensus algorithms for adding blocks to private blockchains in IIoT networks : Comparison of two Proof-of-Authentication implementations on IIoT hardware
University essay from KTH/Hälsoinformatik och logistikAbstract : The Internet of Things (IoT) market is growing by the day and there are no signs of stagnation. As the market grows, it becomes all the more important to address security concerns. A major security issue of IoT is that the devices usually send their collected data to a centralized entity, creating a single point of failure. READ MORE