Dissertations / Theses on the topic 'IoT, Security IoT, IoT Protocol, 5G'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 dissertations / theses for your research on the topic 'IoT, Security IoT, IoT Protocol, 5G.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Centenaro, Marco. "On the Support of Massive Machine-to-Machine Traffic in Heterogeneous Networks and Fifth-Generation Cellular Networks." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426783.
Full textLa diffusione capillare di molti servizi emergenti grazie all’Internet of Things (IoT) passa attraverso la capacità di fornire connettività senza fili a lungo raggio ad un numero massivo di cose, superando le note criticità delle reti ad hoc a corto raggio. Questa visione comporta grandi sfide, a partire dalle preoccupazioni riguardo l’efficienza delle rete di accesso fino alle minacce alla sicurezza delle reti IoT. In questa tesi, ci concentreremo sia sugli standard di comunicazione a lungo raggio per l’IoT sia sulla ricerca di base per le reti IoT. Dopo aver analizzato come vengono supportate le comunicazioni Machine-to-Machine (M2M) oggi, forniremo soluzioni innovative le quali i) soddisfano i requisiti in termini di scalabilità e latenza, ii) utilizzano una combinazione di bande di frequenza licenziate e libere e iii) assicurano efficienza energetica e sicurezza.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Full textLindh, André. "5G, IoT och dess säkerhetsutmaningar: En litteraturstudie." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413640.
Full textDenna litteraturstudie identifierar de säkerhetsutmaningar som finns i relation till 5G och Internet of Things. Litteraturstudien använder en systematisk metod för litteratursökning som är författad av Okoli (2015). I samband med litteratursökningen görs ett urval på 60 artiklar som mot kvalitetskriterier avgränsas till 19 artiklar. Säkerhetsutmaningarna som presenteras i dessa 19 artiklar delas vidare upp delvis efter vilket område av säkerhet de behandlar samt om de presenterar en säkerhetsrisk eller säkerhetsåtgärd. Resultatet ger en överblick av vilka av dessa områden inom säkerhet relaterade till 5G och Internet of Things som är vanligast förekommande. Undersökningen belyser avsaknaden av vissa typer av säkerhetsrisker och åtgärder som svarar för dessa. Undersökningen belyser också en avsaknad av ett mer holistiskt perspektiv i synen på säkerhet relaterat till 5G och framtidens Internet of Things.
Shahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Full textvan, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Full textParvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.
Full textConceicao, Filipe. "Network survival with energy harvesting : secure cooperation and device assisted networking." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL020/document.
Full textThe 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of Things (IoT) and it introduced a major feature, Device-to-Device (D2D) communications. D2D allows energy-constrained wireless devices to save energy by interacting in proximity at a lower transmission power. Cooperation and device-assisted networking therefore raise signicant interest with respect to energy saving, and can be used in conjunction with energy harvesting to prolong the lifetime of battery-powered devices. However, cooperation schemes increase networking between devices, increasing the need for security mechanisms to be executed to assure data protection and trust relations between network nodes. This leads to the use of cryptographic primitives and security mechanisms with a much higher frequency.Security mechanisms are fundamental for protection against malicious actions but they also represent an important source of energy consumption, often neglected due to the importance of data protection. Authentication procedures for secure channel establishment can be computationally and energetically expensive, especially if the devices are resource constrained. Security features such as condentiality and data authentication have a low energetic cost but are used constantly in a device engaged in data exchanges. It is therefore necessary to properly quantify the energy consumption due to security in a device. A security based energy model is proposed to achieve this goal.In User Equipment (UE) D2D networks, mobility is a key characteristic. It can be explored for connecting directly in proximity with IoT objects. A lightweight authentication solution is presented that allows direct UE-IoT communications, extending coverage and potentially saving signicant energy amounts. This approach can be particularly useful in Public Protection and Disaster Relief (PPDR) scenarios where the network infrastructure may not be available.Security features such as condentiality or data authentication are a significant source of consumption. Devices equipped with Energy Harvesting (EH) hardware can have a surplus or a deficit of energy. The applied security can therefore be adjusted to the available energy of a device, introducing an energy aware secure channel. After in depth analysis of 5G standards, it was found that D2D UE networks using this type of channel would spend a signicant amount of energy and be generally less secure. A lightweight rekeying mechanism is therefore proposed to reduce the security overhead of adapting security to energy. To complete the proposed rekeying mechanism, a security parameter bootstrapping method is also presented. The method denes the Core Network (CN) as the security policy maker, makes the overall network more secure and helps preventing communication outages.Adapting security features to energy levels raises the need for the study of the energy/security tradeoff. To this goal, an Markov Decision Process (MDP) modeling a communication channel is presented where an agent chooses the security features to apply to transmitted packets. This stochastic control optimization problem is solved via several dynamic programming and Reinforcement Learning (RL) algorithms. Results show that adapting security features to the available energy can signicantly prolong battery lifetime, improve data reliability while still providing security features. A comparative study is also presented for the different RL learning algorithms. Then a Deep Q-Learning (DQL) approach is presented and tested to improve the learning speed of the agent. Results confirm the faster learning speed. The approach is then tested under difficult EH hardware stability. Results show robust learning properties and excellent security decision making from the agent with a direct impact on data reliability. Finally, a memory footprint comparison is made to demonstrate the feasibility of the presented system even on resource constrained devices
Ralambotiana, Miora. "Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230671.
Full textIdag blir Internet av saker (IoT) applikationer allt viktigare i människors vardag. Beroende på användningen (för långeller kortdistanskommunikation, med låga eller höga effektenheter etc.) finns flera standarder. I denna studie ligger fokus på Low Power Wide Area Networks (LPWAN) och i synnerhet ett protokoll som ökar i popularitet för långsiktig lågkapacitetskommunikation i IoT: LoRaWAN. LoRaWAN är fortfarande på ett tidigt stadium och har i huvudsak använts i användarfall där nätverksservern hanterade nycklarna som säkerställer konfidentialitet och integritet av data. Gemalto har tagit upp frågan om intressekonflikter i det fall nätverksoperatören och programleverantören är två separata enheter: Om slutanordningen och applikationsservern utbyter känslig data, ska nätverksservern inte kunna läsa dem. För att lösa detta problem har en arkitektur som använder en betrodd tredje part för att generera och hantera nycklarna implementerats under det här projektet. Följande forskning syftar till att hitta säkerhetshot och svagheter om konfidentialiteten och integriteten hos data och enheternas autentisering i detta studiefall. LoRaWAN-protokollet och nyckelhanteringen i allmänhet kommer att studeras först innan författaren beskriver det studerade systemet och upptäcker de eventuella attacker som undersöker sårbarheten på de nämnda punkterna via ett angreppsträd. Dessa attacker kommer att simuleras för att definiera deras konsekvenser på systemet och enligt dem kommer säkerhetsförbättringar på arkitekturen att föreslås utifrån tidigare arbete med ämnet och undersökning av potentiella motåtgärder
Lindorin, Axel. "Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.
Full textThis study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
Fredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.
Full textNizzi, Francesca. "Security in IoT systems - Issues and Solutions." Doctoral thesis, 2020. http://hdl.handle.net/2158/1185966.
Full textYang, Tsung Kai, and 楊淙凱. "Design of a Blockchain Security Protocol for IoT." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/x3ccqm.
Full textЯєчник, Олександр Петрович, and Oleksandr Petrovych Yaiechnyk. "Дослідження протоколів взаємодії з IoT-пристроями при формуванні інформаційно-технологічних платформ." Master's thesis, 2020. http://elartu.tntu.edu.ua/handle/lib/34116.
Full textThe qualification work is devoted to the study of protocols of interaction of IoT-devices and systems and the formation of an information technology platform for the management of IoT-devices. The first section of the qualification work considers the relevance of research in the field of the Internet of Things. The problems of the Internet of Things are covered. The current state of research in the field is analyzed. The IoT ecosystem is described. The second section of the qualification work discusses data transfer protocols for IoT devices and systems. IoT-protocols of network layer routing are investigated. IoT network layer encapsulation protocols are described. Session layer IoT protocols are analyzed. IoT devices and systems control protocols are covered. The third section of the qualification work considers the description of the structure of the information technology platform for integration and control of IoT-devices formed on the basis of the analysis of scientific sources, designed in the form of a nine-level model. The electrical safety of computer users' workplaces is considered separately and the organization of civil protection at industrial facilities is described.
ВСТУП ...8 1 ІНТЕРНЕТ РЕЧЕЙ – СТАН ТА ПЕРСПЕКТИВИ ДОСЛІДЖЕНЬ ...10 1.1 Актуальність досліджень в галузі Інтернету речей ...10 1.2 Проблематика Інтернету речей ...12 1.3 Аналіз сучасного стану досліджень ...14 1.4 IoT-екосистема ...19 1.5 Висновки до першого розділу ...21 2 СТАНДАРТИ ТА ПРОТОКОЛИ ДЛЯ ІНТЕРНЕТУ РЕЧЕЙ ...22 2.1 Протоколи передачі даних для IoT-пристроїв та систем ...22 2.2 IoT-протоколи маршрутизації мережевого рівня ...29 2.3 Протоколи інкапсуляції мережевого рівня IoT ...31 2.4 IoT-протоколи сеансового рівня ...33 2.5 Протоколи управління IoT-пристроями та системами ...38 2.6 Висновок до другого розділу ...40 3 ІНФОРМАЦІЙНО-ТЕХНОЛОГІЧНОЇ ПЛАТФОРМА ТА БЕЗПЕКА IOT-СИСТЕМ ...42 3.1 Структура інформаційно-технологічної платформи для інтеграції та управління IoT-пристроями ...42 3.2 Протоколи та стандарти для убезпечення IoT-систем...52 3.3 Проєкти для підвищення рівня безпеки IoT-пристроїв ...56 3.4 Висновок до третього розділу ...58 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ ...59 4.1 Електробезпека робочих місць користувачів комп’ютерів...59 4.2 Організація цивільного захисту на об’єктах промисловості та виконання заходів щодо запобігання виникненню надзвичайних ситуацій техногенного походження ...62 ВИСНОВКИ ...65 ПЕРЕЛІК ДЖЕРЕЛ ...67 ДОДАТКИ
CHIU, YI-KAI, and 邱奕愷. "Implement an IoT Mobile Medical Information Micro-system with Voice over Internet Protocol and data transmission security." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/u86bwx.
Full text南臺科技大學
電機工程系
107
The Internet of Things (IoT) is the concept that allows objects to become intelligently and interactively connected, and the primary developmental trend for the World Wide Web. However, hospitals and clinics have not become full adopters of the IoT due to the high standard of medical data protection required of healthcare institutions. The principle of their network utilization is, therefore, isolation by design. Furthermore, popular instant messaging technologies have gradually replaced conventional telecommunication technologies and costs, and have become an essential medium in everyday interaction. This study uses three Raspberry Pi 3 Model B and the SY-3000 6-in-1 biosensor module to build an IoT based mobile microsystem platform for processing medical information, integrating Qt, MQTT, TLS data encryption and VoIP communication technologies. The microsystem is tested for its cross-platform performance, low-energy consumption, low cost, immediate assistance, high security, and extension capability. This study hopes to use these technologies to improve medical personnel efficiency and improve operational procedure clustering and data record formatting. The microsystem also includes an instant audio communication component and can reduce installation cost and space consumption typical of conventional landline telephone systems. This microsystem will first serve hospitals and hospice care institutions, providing nurses stations with wifi-transmitted, simultaneous biosignal monitoring of multiple patients. In particular, the biosignal monitoring used in this microsystem builds on a Raspberry Pi integrated SY-3000 module, which is itself an IoT biosignal monitoring medical instrument. It uses Qt developer-designed user interface to provide text and graphics for medical personnel, and uses MQTT and TLS information security protocol for the transmission link with the nurses station, thereby effectively lower data transmission bandwidth demand and ensure patients' medical data privacy. There is also a second Raspberry Pi that acts as a Micro-Server, integrating MQTT, VoIP, LAMP servers to streamline management. Then a third Raspberry Pi serves as a nurses station dedicated to data management, which would receive biosignals from each ward via MQTT and TLS security protocol, confirm data upload to cloud data server and provide smart device monitoring capability. For patients and their family members, VoIP IV technology further provides communication capability with nurses stations for emergency assistance. Together, this IoT and voice communication system with total tracking and security can establish immediate patient health management and operation with the highest efficiency.
HA, DUY AN, and 河惟安. "Efficient Authentication of Resource-Constrained IoT Devices based on ECQV Implicit Certification Algorithm and Datagram Transport Layer Security (DTLS) Protocol." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/81819469752798560149.
Full text國立交通大學
電機資訊國際學程
105
IoT applications often work with sensitive data and are made up of a large number of constrained devices. These characters require that IoT applications must have a robust and scalable security solution. In this case, public-key cryptography can be the best choice if the cost of computation is acceptable for the constrained devices. For that reason, this work will introduce a low-cost public-key cryptography solution for the constrained devices. The solution is developed base on elliptic curve cryptography and Datagram Transport Layer Security (DTLS) protocol. The elliptic curve cryptography, combined with Elliptic Curve Qu-Vanstone (ECQV) implicit certificate, will offer a public-key cryptography solution with low-cost of computation and bandwidth for IoT applications, and by using the standard protocol DTLS, the solution can be accepted widely. The solution is a security protocol consisting of two phases. The first phase is registration phase in which a constrained node need to execute enrolment procedure to authenticate and get an ECQV implicit certificate from the certificate authority of the IoT system. The obtained ECQV implicit certificate is then used for performing authentication and key exchange scheme in the second phase, this phase is called secure key establishment phase. To prove the feasibility of the solution, an implementation of the protocol has been done based on an embedded SSL library – wolfSSL, and an evaluation of execution time of the implementation is also conducted to assess the efficiency of the solution.
Wilson, Preethy. "Inter-device authentication protocol for the Internet of Things." Thesis, 2017. http://hdl.handle.net/1828/8139.
Full textGraduate
0544
0984
0537
pwilson1@uvic.ca