Essays about: "iot protocol"
Showing result 6 - 10 of 126 essays containing the words iot protocol.
-
6. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
7. An Evaluation of IoT Application Protocols
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hur vi människor kommer att leva i framtiden kan kraftigt påverkas utav konceptet Internet of Things. IoT erbjuder unika möjligheter för att hjälpa oss människor att automatisera och förenkla vissa ärenden. Även om koncpetet har funnits ett tag så har man fortfarande vilseledda åsikter kring potentialen med IoT. READ MORE
-
8. Performance Evaluation of Different RPL Formation Strategies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The size of the IoT network is expanding due to advancements in the IoT field, leading to increased interest in the multi-sink mechanism. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a representative IoT protocol that focuses on the Low-Power and Lossy Networks. READ MORE
-
9. Side-channel information and electromagnetic leakage: investigation at a microstrip design level
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The number of IoT devices is increasing all over the world. As with any electrical device, they emit electromagnetic emissions. These emissions pose a security threat when it comes to electromagnetic side-channel attacks. READ MORE
-
10. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE