• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 578
  • 127
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 928
  • 391
  • 370
  • 280
  • 263
  • 222
  • 196
  • 177
  • 174
  • 152
  • 151
  • 126
  • 99
  • 83
  • 83
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A Study of Low-Power Wide-Area Networks and an In-Depth Study of the LoRaWAN Standard

PETTER, LAGUSSON, JOHANNA, NORDLÖF January 2017 (has links)
Low Power Wide Area Networks (LPWAN) are able to combine long range communication with a low energy consumption sacrificing performance in terms of bit rate and message frequency. This thesis presents a general evaluation of the LPWAN characteristics and a description of the LPWAN protocols LoRaWAN, SigFox and NB-IoT. It also covers a method to evaluate if a LPWAN technology would be a suitable choice of communication technology for a certain use case. Lastly, it covers the implementation of LoRaWAN on a connected electromechanical lock and investigates in the real life performance of the lock by using eight nodes in two case studies involving four locations each. The lock was evaluated from how often it was able to send a heartbeat (a status message), how reliable the communication was, what latency a user could expect and how much energy a data transmission required. Two of the eight nodes were placed in a deep indoor environment. One of them, located 0.794 km from a gateway was able transmit every 150th second. The other one located 1.85 km from a gateway was not able to successfully deliver any packets at all. Five nodes were able to transmit most heartbeats within 10 seconds. The Packet Delivery Ratio (PDR) was below 90% for all locations except for one. In this location, the node was placed close to a large window and managed to communicate with a gateway 3.22 km away with a PDR of 97% and almost exclusively with less than 10 seconds between transmission. The results in this thesis show the potential in LoRaWAN but highlights how dependent the performance will be of the placement of the lock. / Genom att kombinera låg dataöverföringshastighet och låg meddelandefrekvens kan LPWAN uppnå en kommunikation med lång räckvidd och låg energiförbrukning. Denna uppsats går igenom vad som karaktäriserar LPWAN i stort samt presenterar LPWAN-protokollen LoRaWAN, SigFox och NB-IoT. Den visar även en metod vilken kan användas för att utvärdera hur väl ett use case lämpar sig för LPWAN-tekniken. Slutligen görs en implementering av LoRaWAN i ett uppkopplat lås från ASSA ABLOY för att undersöka vilken prestanda som är möjlig att uppnå för åtta olika noder i två olika fallstudier. Låset utvärderades utfirån hur ofta det kunde skicka statusmeddelanden, hur tillförlitlig kommunikationen var samt hur mycket energi som förbrukades. Två av åtta noder placera-des långt in i sina respektive byggnader, den ena kunde endast skicka statusuppdateringar i intervaller om 150 sekunder och den andra lyckades inte leverera några datapaket alls. Fem noder lyckades skicka de flesta statusuppdateringerna i intervall under tio sekunder. Resultatet visade på en packet delivery ratio under 90% i samtliga fall förutom ett. Där placerades noden nära ett stort fönster och lyckades kommunicera med en gateway 3.22 km bort med en PDR på 97% och mindre än 10 sekunder mellan sändningarna. Detta resultat visar potentialen för LoRaWAN men belyser även hur beroende prestandan kommer att vara av hur låset placeras.
22

Unlicensed and licensed low-power wide area networks : Exploring the candidates for massive IoT

Sjöström, Daniel January 2017 (has links)
In the Internet of things (IoT), many applications will require low-power and low-cost to achieve long lifetime and scale (respectively). These types of applications are referred to as massive IoT, as opposed to critical IoT, which emphasizes ultra-high reliability and availability and low latency. One type of network catering to massive IoT applications are Low-Power Wide Area Networks (LPWANs), and presently, many LPWAN standards are trying to assert their role in the IoT ecosystem. This thesis explores LPWANs from both technical and non-technical perspectives to ascertain their use-case versatility and influence on the future telecommunications’ landscape. With respect to spectrum, the studied LPWANs may be categorized as unlicensed LPWAN or licensed LPWAN. The prior category typically refers to proprietary solutions and in this thesis are represented by SigFox and LoRaWAN. The latter group includes EC-GSM-IoT, eMTC, and NB-IoT and can be considered synonymous with cellular LPWAN because they are designed to be integrated into existing cellular infrastructures. The results indicate that all of the different types of explored LPWANs support applications without strict downlink, payload size, and latency requirements. For use cases without these specific demands (typically sensors, meters, tracking, etc.), it is not a question of whether or not a network fulfills the requirements, but rather how flexible the requirements are. As a result the choice of network will be determined by non-technical aspects and a cost versus functionality trade-off where unlicensed LPWAN is typically cheaper. Hence, both categories of LPWANs offer a unique value proposition; therefore, they can be considered complementary. This notion is reinforced when looking at non-technical aspects such as ecosystem, regulation, network ownership and control, and network coordination, which differ quite significantly. Furthermore, unlicensed LPWANs are likely to be the vanguard of a new type of competitor offering the core service of connectivity. / Inom Internet of Things (IoT) kommer många applikationer att kräva låg effekt och låg kostnad för att uppnå en lång livstid och skala. Dessa typer av applikationer refereras till som massiv IoT, vilket står i motsats till kritisk IoT som kräver ultrahög tillförlitlighet och tillgänglighet och låg fördröjning. En typ av nätverk som ämnar tillgodose kraven av massiv IoT är Low-Power Wide Area Networks (LPWANs), och idag försöker många av dessa hävda sig inom IoT ekosystemet. Detta examensarbete undersöker LPWANs from ett teknisk och icke-tekniskt perspektiv för att utröna deras mångsidighet och påverkan på det framtida telekomlandskapet. Med avseende på spektrum kan de i detta examensarbete undersökta nätverken kategoriseras som olicensierat LPWAN eller licensierat LPWAN. Den tidigare hänvisar typiskt till proprietära lösningar och representeras i detta arbete av SigFox och LoRaWAN. Den senare kategorin består av EC-GSM-IoT, eMTC, och NB-IoT och kan betraktas som synonymt med mobil LPWAN eftersom de designade för att bli integrerade i existerande mobila nätverk. Resultaten indikerar att alla nätverk stödjer applikationer utan strikta krav när det gäller nedlänkens funktionalitet, mängden data per meddelande, och fördröjning. För applikationer utan dessa specifika krav (typiskt sensorer, mätare, spårning, etc.) är det inte en fråga om huruvida ett nätverk uppfyller kraven eller ej, utan snarare hur flexibla kraven är. Därför kommer valet av nätverk att bestämmas av icke-tekniska aspekter och en avvägning mellan kostnad och funktionalitet vari olicensierat LPWAN är vanligtvis billigare. Därmed erbjuder båda kategorier av nätverk en unik värde proposition och kan därför betraktas som komplementerande. Denna föreställning är förstärkt av att nätverken skiljer sig signifikant när det gäller deras icke-tekniska aspekter såsom ekosystem, reglering, ägandeskap och kontroll, och nätverks koordinering. Dessutom är olicensierade LPWANs troligen är förtruppen av en ny typ av konkurrent som erbjuder den grundläggande servicen av konnektivitet.
23

Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera / Etisk hackning av en smart IoT-Kamera : Ett Penetrationstest på D-Link DCS 8515-LH Smart Kamera

Zhuang, Chunyu January 2023 (has links)
The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. As the IoT devices collects sensitive data, properly protect users’ privacy is also a crucial aspect for IoT devices. Thus, IoT devices need to be secure enough against modern cyber-attacks. In this work, a smart camera DCS-8515LH from D-Link is under penetration tests. Threat modeling is first performed as an analysis of the IoT system following by a dozen cyber attacks targeting this smart camera. The penetration tests provide valuable information that can reveal the smart camera’s vulnerability and weakness, such as security misconfiguration, vulnerability to DoS attacks. The smart camera is discovered to be vulnerable to DoS attacks and exploits on the zero-configuration protocol. Several weaknesses which violate the users’ privacy exist in the mobile application and Android storage system. This work evaluated all the vulnerabilities and weaknesses discovered from a security aspect. This report exposes attacks that are effective on the smart camera and also serves as a fundamental basis for future penetration tests on this smart camera. / I detta arbete är en smart kamera DCS-8515LH från D-Link under penetrationstester. Hotmodellering utförs först som en analys av IoT-systemet följt av ett dussin cyberattacker riktade mot denna smarta kamera. Penetrationstesterna ger värdefull information som kan avslöja den smarta kamerans sårbarhet och svaghet, såsom säkerhetsfelkonfiguration, sårbarhet för Dos-attacker. Den smarta kameran har upptäckts vara sårbar för DoS-attacker och utnyttjande av nollkonfigurationsprotokollet. Flera svagheter som kränker användarnas integritet finns i mobilapplikationen och Android-lagringssystemet. Detta arbete utvärderade alla sårbarheter och svagheter som upptäckts ur en säkerhetsaspekt. Den här rapporten avslöjar attacker som är effektiva på den smarta kameran och fungerar också som en grundläggande bas för framtida penetrationstester på denna smarta kamera.
24

Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

Al Allaf, Abdulrahman, Totonji, Waseem January 2023 (has links)
Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. This thesis investigates the most common IoT security threats and attacks, students’ awareness of them and their mitigation strategies, and the key challenges associated with IoT forensic investigations. A mixed-method approach is adopted in this thesis combining a literature review and a survey study. The survey assesses students’ knowledge of IoT security threats, mitigation techniques, and perceptions of the most effective ways to enhance IoT security. The survey also emphasizes the importance of user training and awareness in mitigating IoT threats, highlighting the most effective strategies, such as stronger regulations and improved device security by manufacturers. The literature review provides a comprehensive overview of the most common IoT security threats and attacks, such as malware, malicious code injection, replay attacks, Man in the Middle (MITM), botnets, and Distributed Denial of Service Attacks (DDoS). The mitigation techniques to these threats are overviewed as well as real-world incidents and crimes, such as the Mirai botnet, St. Jude Medical implant cardiac devices hack, and the Verkada hack, are examined to understand the consequences of these attacks. Moreover, this work also highlights the definition and the process of digital and IoT forensics, the importance of IoT forensics, and different data sources in IoT ecosystems. The key challenges associated with IoT forensics and how they impact the effectiveness of digital investigations in the IoT ecosystem are examined in detail. Overall, the results of this work contribute to ongoing research to improve IoT device security, highlight the importance of increased awareness and user training, and address the challenges associated with IoT forensic investigations.
25

Diseño, especificación, implementación y validación de habilitadores digitales para la interoperabilidad de plataformas de Internet de las cosas (IoT)

González Usach, Régel 28 March 2022 (has links)
[ES] Internet de las Cosas (IoT) es un paradigma tecnológico que está transformando y revolucionando el mundo en el cual vivimos, liderando la transformación digital y generando enormes posibilidades desde el punto de vista tecnológico que pueden solucionar grandes problemas y retos en nuestra sociedad y efectuar cambios profundos en nuestra economía e industria, y transformar nuestra vida cotidiana . Sin embargo, para poder obtener estos grandes beneficios y explotar todo su potencial todavía hace falta abordar y resolver grandes retos tecnológicos asociados. La interoperabilidad es el mayor reto tecnológico del paradigma IoT, conjuntamente con la seguridad, a causa de la vasta heterogeneidad inherente del universo IoT a todos los niveles y la falta de una estandarización global aceptada de facto capaz de alinear sus diferentes elementos y aspectos, que actualmente no se considera viable conseguir. La capacidad de elementos y sistemas de comunicarse y compartir información de manera efectiva entre ellos habilita intercambios de información relevante, coordinación o cooperación entre sí y sinergias. La fragmentación de la información de sistemas IoT y falta inherente de interoperabilidad en este paradigma causa graves problemas económicos y tecnológicos, e impide las sinergias entre sistemas. Se considera que la carencia de interoperabilidad es el mayor obstáculo para la formación de un ecosistema global de IoT, un hito en la transformación digital, puesto que impide la integración horizontal de mercados verticales y deja una gran fragmentación entre los sistemas basados en información obtenida con la tecnología IoT. IoT, uno de los paradigmas o habilitadores clave de la transformación digital, está enormemente limitada por carencias de interoperabilidad, que impiden su crecimiento, evolución y despliegue de todo su potencial. Es absolutamente crítico resolver el problema de falta intrínseca de interoperabilidad entre plataformas IoT para poder avanzar tecnológicamente hacia el Internet del Futuro, la Nueva Generación de IoT y la digitalización del mundo. La habilitación de la interoperabilidad entre sistemas y a lo largo de los sistemas, para conseguir un ecosistema interconexionado global, es un reto complejo y de múltiples facetas. Entre ellas, la interoperabilidad semántica, que implica el entendimiento completo, automático y sin ambigüedades de la información compartida entre sistemas, es singularmente compleja de obtener entre plataformas IoT a causa de la alta heterogeneidad entre sus modelos de información. En esta tesis se abarca el estudio, diseño, especificación, implementación y validación de habilitadores digitales (herramientas tecnológicas que promueven la digitalización del mundo) para establecer interoperabilidad en IoT en diferentes niveles (técnico, sintáctico, semántico) con especial enfoque en la interoperabilidad semántica entre plataformas heterogéneas, uno de los retos técnicos más complejos actualmente en IoT. También se abordan en el estudio y construcción de estos habilitadores temas a resolver de Internet del Futuro y la Nueva Generación de Internet de las Cosas. / [CA] Internet de les Coses (IoT) és un paradigma tecnològic que està transformant i revolucionant el món en el qual vivim, liderant la transformació digital i generant enormes possibilitats des del punt de vista tecnològic que poden solucionar grans problemes i reptes en la nostra societat i efectuar canvis profunds en la nostra economia i indústria, i transformar la nostra vida quotidiana. No obstant això, per a poder obtindre aquests grans beneficis i explotar tot el seu potencial encara fa falta abordar i resoldre grans reptes tecnològics associats. La interoperabilitat és el major repte tecnològic del paradigma IoT, conjuntament amb la seguretat, a causa de la vasta heterogeneïtat inherent de l'univers IoT a tots els nivells i la falta d'una estandardització global acceptada de facto capaç d'alinear els seus diferents elements i aspectes, que actualment no es considera viable aconseguir. La capacitat d'elements i sistemes de comunicar-se i compartir informació de manera efectiva entre ells habilita intercanvis d'informació rellevant, coordinació o cooperació entre si i sinergies. La fragmentació de la informació de sistemes IoT i falta inherent d'interoperabilitat en aquest paradigma causa greus problemes econòmics i tecnològics, i impedeix les sinergies entre sistemes. Es considera que la manca d'interoperabilitat és el major obstacle per a la formació d'un ecosistema global de IoT, una fita en la transformació digital, ja que impedeix la integració horitzontal de mercats verticals i deixa una gran fragmentació entre els sistemes basats en informació obtinguda amb la tecnologia IoT. La IoT, un dels paradigmes o habilitadors clau de la transformació digital, està enormement limitada per manques d'interoperabilitat, que impedeixen el seu creixement, evolució i desplegament de tot el seu potencial. És absolutament crític resoldre el problema de falta intrínseca d'interoperabilitat entre plataformes IoT per a poder avançar tecnològicament cap a la Internet del Futur, la Nova Generació de IoT i la digitalització del món. L'habilitació de la interoperabilitat entre sistemes i al llarg dels sistemes, per a aconseguir un ecosistema interconnectat global, és un repte complex i de múltiples facetes. Entre elles, la interoperabilitat semàntica, que implica l'enteniment complet, automàtic i sense ambigüitats de la informació compartida entre sistemes, és singularment complexa d'obtindre entre plataformes IoT a causa de l'alta heterogeneïtat entre els seus models d'informació. En aquesta tesi s'abasta l'estudi, disseny, especificació, implementació i validació d'habilitadors digitals (eines tecnològiques que promouen la digitalització del món) per a establir interoperabilitat en IoT en diferents nivells (tècnic, sintàctic, semàntic) amb especial enfocament en la interoperabilitat semàntica entre plataformes heterogènies, un dels reptes tècnics més complexos actualment en IoT. També s'aborden en l'estudi i construcció d'aquests habilitadors temes a resoldre d'Internet del Futur i la Nova Generació d'Internet de les Coses. / [EN] The Internet of Things (IoT) is a technological paradigm that is transforming and revolutionising the world we live in, leading the digital transformation and generating enormous technological possibilities that could solve major challenges in our society, effect profound changes in our economy and industry and transform our daily lives. However, in order to realise these great benefits and exploit IoT's full potential, there are major associated technological challenges to be addressed and solved. Interoperability is the biggest technological challenge of the IoT paradigm, together with security, because of the vast inherent heterogeneity in IoT at all levels and the lack of a de facto global standard capable of aligning its different elements and aspects, which is currently not considered feasible to achieve. The ability of elements and systems to communicate and share information effectively with each other enables exchanges of relevant information, coordination or cooperation with each other and synergies. The fragmentation of information in IoT systems and inherent lack of interoperability in this paradigm causes serious economic and technological problems, and prevents synergies between systems. The lack of interoperability is considered to be the biggest obstacle to the formation of a global IoT ecosystem, a milestone in the digital transformation, as it prevents horizontal integration of vertical markets and leaves a large fragmentation between systems based on IoT-derived information. IoT, one of the key paradigms or enablers of digital transformation, is severely constrained by interoperability gaps, which impede its growth, evolution and deployment of its full potential. It is absolutely critical to solve the problem of intrinsic lack of interoperability between IoT platforms in order to move technologically towards the Future Internet, the Next Generation IoT and the digitisation of the world. The enablement of interoperability between and across systems to achieve a globally interconnected ecosystem is a complex and multi-faceted challenge. Among them, semantic interoperability, which implies an automatic unambiguous understanding of the information shared between systems, is hardly feasible between IoT platforms due to the high heterogeneity of information models. This thesis covers the study, design, specification, implementation and validation of digital enablers to establish IoT interoperability at different levels (technical, syntactic, semantic) with special focus on semantic interoperability between heterogeneous platforms, one of the most complex technical challenges currently in IoT. The study and construction of these enablers also address issues to solve in the Future Internet and the Next Generation of the Internet of Things. / González Usach, R. (2022). Diseño, especificación, implementación y validación de habilitadores digitales para la interoperabilidad de plataformas de Internet de las cosas (IoT) [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/181643 / TESIS
26

Administratörsverktyg för IOT-enheter / Administrator Tool for IOT-Devices

Wahlman, Johan January 2015 (has links)
IoT (Internet of Things) are devices which are usually equipped with different kinds of sensors, these sensor values are then sent to a server where these values are somehow processed. It’s predicted that the usage of IoT devices will increase significantly during the upcoming years.   Microsoft has a service named Azure IoT Hub, which is designed for easy administration of IoT devices, but Azure IoT Hub provides no user interface to administer these IoT devices. The task of this project is to create a user interface for Azure IoT Hub. / IoT (Internet of Things) är enheter som vanligtvis är utrustade med olika slags sensorer, dessa sensorvärden skickas sedan till en server där dessa värden på något sätt bearbetas. Det förutspås att användandet av IoT enheter kommer att öka signifikant under de kommande åren.   Microsoft har en tjänst som heter Azure IoT Hub, vilket är designat för att enkelt administrera IoT enheter, men Azure IoT Hub tillhandahåller inget gränssnitt för att kunna administrera dessa IoT enheter. Uppdraget för detta projekt var därför att skapa ett gränssnitt för Azure IoT Hub.
27

Security Assessment of IoT- Devices Grouped by Similar Attributes : Researching patterns in vulnerabilities of IoT- devices by grouping devices based on which protocols are running. / Säkerhetsbedömning av IoT-Enheter Grupperade efter Liknande Egenskaper

Sannervik, Filip, Magdum, Parth January 2021 (has links)
The Internet of Things (IoT) is a concept that is getting a lot of attention. IoT devices are growing in popularity and so is the need to protect these devices from attacks and vulnerabilities. Future developers and users of IoT devices need to know what type of devices need extra care and which are more likely to be vulnerable. Therefore this study has researched the correlations between combinations of protocols and software vulnerabilities. Fifteen protocols used by common services over the internet were selected to base the study around. Then an artificial neural network was used to group the devices into 4 groups based on which of these fifteen protocols were running. Publicly disclosed vulnerabilities were then enumerated for all devices in each group. It was found that the percentage of vulnerable devices in each group differed meaning there is some correlation between running combinations of protocols and how likely a device is vulnerable. The severity of the vulnerabilities in the vulnerable devices were also analyzed but no correlation was found between the groups. / Sakernas internet eller Internet of things (IoT) är ett koncept som fått mycket uppmärksamhet. IoT enheter växer drastisk i popularitet, därför är det mer nödvändigt att skydda dessa enheter från attacker och säkerhetsbrister. Framtida utvecklare och användare av IoT system behöver då veta vilka enheter som är mer troliga att ha säkerhetsbrister. Denna studie har utforskat om det finns något samband mellan kombinationer av aktiva protokoll i enheter och säkerhetsbrister. Femton vanligt använda protokoll valdes som bas för studien, ett artificiellt neuralt nätverk användes sedan för att gruppera enheter baserat på dessa protokoll. Kända sårbarheter i enheterna räknades upp för varje grupp. En korrelation mellan kombinationer av protokoll och trolighet för sårbarheter hittades. Allvarlighetsgraden av säkerhetsbristerna i sårbara enheter analyserades också, men ingen korrelation hittades mellan grupperna.
28

The future of Real estate lies in the Internt of Things

Henningsson, Fabian, Ljungdahl, Harley January 2018 (has links)
Title: The future of Real estate lies in the Internet of Things Date: 2018-05-22 Grade: Bachelor Thesis Authors: Fabian Henningsson & Harley Ljungdahl Supervisor: Navid Ghannad Purpose: Understand how IoT can create value when implemented within real estate companies Frame of reference: In this part we will present our frame of reference. Our key concepts when gathering this secondary data was IoT, Value creation. These key concepts formed how our model for Value Creation in IoT for real estate companies would look like. Method: In this chapter we have described the method we used to collect our primary data. We have also presented a discussion about why we have chosen the methods we have used and what relevance they have for our survey. Finally, we present the reliability and validity of our sources and research. Empiric: We have interviewed three companies active on the Swedish real estate market. How they use and how they look at the use of IoT technology in an enterprise perspective. Analysis: We have made both a within and cross case analysis on the empirical findings and this has resulted in our model explaining the primary value drivers of IoT in real estate companies. Conclusion: With the help of our primary value drivers in our model and innovation, it´s suggested that the real estate companies can create value with the help of IoT solutions. Keywords: IoT, IoT and real estate, Smart cities, value creation, IT and value creation, IoT value creation and value chain model. Examiner: Thomas Helgesson
29

On the assessment of Denial of Service vulnerabilities affecting smart home systems

Andersson, Sebastian, Josefsson, Oliver January 2019 (has links)
IoT is an abbreviation of the term Internet of Things. The term describes everydayitems such as light bulbs that are connected to the Internet. IoT is a field that isgrowing very quickly with some researchers and industry leaders predicting thatthere will be up to 200 billion connected IoT devices in the world by 2020. Many IoTdevices are developed by smaller companies looking to capitalize on a specific needin the market. Because of this, the companies may favor launching a product as fastas possible which could mean that the devices may have not been adequately testedfor different vulnerabilities.The IoT and Smart Home market is currently experiencing rapid growth and all signspoint towards that continuing in the future. This thesis focuses on testing forvulnerabilities to Denial of Service attacks in common-off-the-shelf IoT devices thatcan be found in a smart home environment. The purpose of this thesis is to createmore knowledge about the vulnerabilities that can be found in Internet connecteddevices that are used daily.This thesis includes experiments using OpenVAS, which is a vulnerability scannerdeveloped by Greenbone Security used to test for vulnerabilities to Denial of Serviceattacks in IoT devices. The devices that are tested are Sony PlayStation 4, IKEATrådfri Smart Lighting, Google Chromecast (First Generation), Apple TV (ThirdGeneration) and D-Link DCS-930LB Wi-Fi IP-Camera. The firmware/software of allthe devices are updated as of April of 2019.The results of the conducted experiments show that all the tested devices besidesChromecast and IKEA Trådfri had vulnerabilities to Denial of Service attacks.PlayStation 4 was the device with the highest amount of vulnerabilities (9) and thevulnerability with highest possible severity (10.0). The effects of a Denial of Serviceattack range from an annoyance, when a gaming console is unavailable, to a securityrisk when an IP camera can be temporarily disabled.
30

Framtagning av affärsmodell inom Internet of Things : En studie om hur ett IT-konsultbolag kan verka som integratör inom IoT-ekosystemet

Bälter Eronell, Sofia, Lindvall, Lisa January 2016 (has links)
This study examines how an Information Technology consulting firm can act as an integrator for the Internet of Things. The aim is to contribute to a greater understanding of how the IoT-ecosystem looks and what roles an integrator can take in collaboration with partners. In order to create a deeper understanding of the topic a qualitative study was conducted with Softhouse's partners, customers, and themselves, in order to place them within the IoT-ecosystem. The study focused on examining how IoT solutions can be implemented in the forestry industry. The results show that Softhouse has a great potential to offer IoT solutions by a solid collaboration with partners. They should focus on becoming experts in data analysis through training and recruitment. Selection of partners for different projects depends on its size, complexity and type. Through analysis and by using the business model Business Model Canvas it is possible to see which partners are most suitable for which type of project. This was applied to two such cases with clients in the forest industry; Södra Skog and APEA Mobile Security Solutions.

Page generated in 0.0453 seconds