Essays about: "IoT privacy concerns"

Showing result 1 - 5 of 17 essays containing the words IoT privacy concerns.

  1. 1. Federated Machine Learning for Resource Allocation in Multi-domain Fog Ecosystems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Weilin Zhang; [2023]
    Keywords : Workload Allocation; Federated Learning; Deep Q-network; Fog networks; Federated Average Aggregation;

    Abstract : The proliferation of the Internet of Things (IoT) has increasingly demanded intimacy between cloud services and end-users. This has incentivised extending cloud resources to the edge in what is deemed fog computing. The latter is manifesting as an ecosystem of connected clouds, geo-dispersed and of diverse capacities. READ MORE

  2. 2. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  3. 3. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE