Essays about: "IoT authentication"

Showing result 6 - 10 of 37 essays containing the words IoT authentication.

  1. 6. Password Security Assessment of IoT-Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mehir Seyum Wolde; Adeel Hussain; [2022]
    Keywords : Passwords; Password Policy; Information Security; Authentication; Smart Home; Application Security; IoT Device; Device Security; Lösenord; Lösenordspolicy; Informationssäkerhet; Autentisering; Smarta Hem; Applikationssäkerhet; IoT-Enhet; Enhetssäkerhet;

    Abstract : With the rapid development of the IoT (Internet of Things) and the integration of connected devices into our households, IoT security is becoming more important. This technology allows the user to accomplish tasks and store information in a more effective way. READ MORE

  2. 7. PUF-enabled blockchain for IoT security : A comparative study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jonathon Bisiach; Victor Elfving; [2021]
    Keywords : Internet of Things; Internet of Everything; Blockchain; Physical Unclonable Functions; Consensus Algorithms; Proof of Work; Proof of Authentication; Proof of PUF-enabled Authentication;

    Abstract : The introduction of Physical Unclonable Functions (PUFs) and lightweight consensus algorithms to aid in the bolstering of security and privacy in both IoT and IoE does show a great deal of promise not only in these areas, but in resource cost over traditional methods of blockchain.  However, several previous studies make claims regarding performance of novel solutions without providing detailed information as to the physical components of their experiments. READ MORE

  3. 8. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  4. 9. Enhancing IoT Security Using 5G Capabilities

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Ankush Makkar; [2021]
    Keywords : IoT; Security; 5G Security; 5G Core Network; 5G IoT; Authentication; Applications Security; Network Layer; Smart Factories; Smart Grid; Industry 4.0;

    Abstract : Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially. READ MORE

  5. 10. Consensus algorithms for adding blocks to private blockchains in IIoT networks : Comparison of two Proof-of-Authentication implementations on IIoT hardware

    University essay from KTH/Hälsoinformatik och logistik

    Author : Kamile Juvencius; Therése Ankarberg; [2021]
    Keywords : IoT; IIoT; blockchain; consensus algorithms; Proof-of-Authentication; CloudRail; IoT; IIoT; blockkedja; konsensusalgoritmer; Proof-of-Authentication; CloudRail;

    Abstract : The Internet of Things (IoT) market is growing by the day and there are no signs of stagnation. As the market grows, it becomes all the more important to address security concerns. A major security issue of IoT is that the devices usually send their collected data to a centralized entity, creating a single point of failure. READ MORE