Essays about: "MbedTLS"

Found 4 essays containing the word MbedTLS.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  2. 2. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  3. 3. Enhanced DTLS Support for the Contiki-NG OS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rudolfs Arvids Kalnins; Kristaps Karlis Kalnins; [2021]
    Keywords : Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operating Systems; Security; Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operativsystem; Säkerhet;

    Abstract : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. READ MORE

  4. 4. Analysis of DTLS Implementations Using State Fuzzing

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fredrik Tåkvist; [2020]
    Keywords : ;

    Abstract : Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to its low latency. Hence, a means for protecting sensitive datasent over UDP is essential. The protocol most commonly used for this purpose is Datagram Transport Layer Security (DTLS). READ MORE