Essays about: "thesis on management using bluetooth"

Found 5 essays containing the words thesis on management using bluetooth.

  1. 1. Designing and Implementing a Web Application for Bluetooth Mesh Device Provisioning and User Management

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Patrik Larsson; [2023]
    Keywords : Technology and Engineering;

    Abstract : As technology progresses, it seems to become increasingly inevitable for everyday objects in our homes to incorporate advanced features, to increase functionality, convenience, and energy management. This master’s thesis presents the continuation of a Bluetooth lighting system, aiming to develop a comprehensive website solution for handling the provisioning and configuration of Bluetooth Mesh devices. READ MORE

  2. 2. IO-Link Wireless : Industrial communication protocol

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Wilhelm von Hacht; Viktor Solid; [2022]
    Keywords : : IO-Link; IOL; IOL-W; IO-Link Wireless; Industry Automation; HMS; CoreTigo; Nordic Semiconductor; Nrf52840;

    Abstract : This thesis investigates two aspects of the protocol IO-Link Wireless (IOL-W), a wireless derivative of the widely established network protocol for industry automation IO-Link (IOL). There is an increasing interest in using wireless solutions within the automation industry. READ MORE

  3. 3. Relay Attack Resistant Passive Keyless Entry : Securing PKE Systems with Immobility Detection

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : ABEL VALKO; [2020]
    Keywords : Passive Keyless Entry; Relay Attack; Mafia Fraud; Access Control; Mechatronics; Nyckellös System; åtkomstkontroll; Relay Attack; IT-säkerhet; Mekatronik;

    Abstract : A significant security risk of modern vehicles is their vulnerability to relay attacks, due to challenge-response methods, such as those employed in Passive Keyless Entry (PKE) used by most commercial cars, being inherently exposed. This class of attacks are where communication between a vehicle and its key is relayed by an attacker over long range - thereby bypassing any encryption and unlocking the vehicle without requiring direct access to the key. READ MORE

  4. 4. An Android application for Meter Terminal Management using Bluetooth Serial Port Profile

    University essay from Programvara och system; Tekniska högskolan

    Author : Henrik Nelson; Andreas Karlsson; [2013]
    Keywords : MBus WMBus Java Android Bluetooth PDA;

    Abstract : When maintaining and configuring systems for Automatic Meter Reading (AMR) it is important to have access to powerful tools for on-site management of the connected metering devices. These tools include mobile phone applications which allow system operators to directly manage the devices through the physical interfaces they expose. READ MORE

  5. 5.  A secure mobile phone-based interactive logon in Windows

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Oleksandr Bodriagov; [2010]
    Keywords : ;

    Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE