Essays about: "wireless authentication"

Showing result 1 - 5 of 34 essays containing the words wireless authentication.

  1. 1. Enhancing Zigbee Security for Industrial Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamza Kadhum; [2020]
    Keywords : Zigbee network security; LoWPAN; IoT; Wireless Sensor Network; Node lifetime; Zigbee nätverk säkerhet; LoWPAN; IoT; Trådlöst Sensornätverk; Sensornodens livslängd;

    Abstract : Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. READ MORE

  2. 2. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  3. 3. On the investigation of vulnerabilities in smart connected cameras

    University essay from Malmö högskola/Fakulteten för teknik och samhälle (TS)

    Author : Désirée Jönsson; [2017]
    Keywords : Smart camera; Internet of Things; Shodan; Smart devices;

    Abstract : Människan har alltid utvecklat produkter för att förenkla sin vardag i hemmet. Ett område som växer snabbt är sakernas Internet där smarta ansluta enheter tillhör. Intentionen med smarta kameror är övervakning där man har möjlighet att bevaka sin intelligenta kamera trådlöst från exempelvis en smartmobil. READ MORE

  4. 4. Detecting Impersonation Attacks in a Static WSN

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Viktor Selleby; Anton Lin; [2017]
    Keywords : Device Fingerprinting; IoT; Machine Learning; Machine to Machine Authentication; Impersonation Attacks; Spoofing Attacks; Wireless Sensor Network; Technology and Engineering;

    Abstract : The current state of security found in the IoT domain is highly flawed, a major problem being that the cryptographic keys used for authentication can be easily extracted and thus enable a myriad of impersonation attacks. In this MSc thesis a study is done of an authentication mechanism called device fingerprinting. READ MORE

  5. 5. Two way Firewall for Internet of Things

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Challa Renuka Venkata Ramani; [2016]
    Keywords : ;

    Abstract : The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. READ MORE