• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 106
  • 62
  • 32
  • 24
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 293
  • 293
  • 77
  • 50
  • 42
  • 42
  • 39
  • 37
  • 36
  • 35
  • 32
  • 31
  • 29
  • 26
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Security analysis of a modern smart camera / Säkerhetsanalys av en smart kamera

Johannesson, Simon, Pettersson, Victor January 2022 (has links)
IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. It follows the Practical and Agile Threat Research for IoT (PatrIoT) methodology and is delimited to network traffic and the software of the device. Due to legal limitations the cloud is not included in the analysis and the hardware security is not included due to time constraints. The device was found to use default credentials for its Open Network Video Interface Forum (ONVIF) service, but it is easy for a user to change the default password from the mobile application if the user can guess what the default password is, and the service is not enabled by default. Three DoS attacks were identified to be effective, two of which caused the device to crash and reboot and the third one prevented the camera from responding until the attack ended. One of the attacks that consistently crashed the camera, could keep crashing the camera repeatedly thus keeping it offline. When analyzing the network traffic, it was possible to consistently detect the packets that notified users of motion or sound detection by looking for specific TCP packet sizes and ports. Although some issues were found the device appeared to be generally secure with encrypted network traffic and minimally exposed services. / Bland IoT-enheter har säkerheten historiskt sett ofta varit eftersatt men det är samtidigt en ständigt växande marknad, därför är det viktigt att säkerhetsanalyserna fortsätter för att utvärdera utvecklingen av säkerheten inom IoT industrin. Denna rapport är resultatet av en säkerhetsanalys av Deltaco SH-IPC05 WIFI Camera, det är en billig enhet som kan nås genom en mobilapplikation via molnet. Den följer metodiken för Practical and Agile Threat Research for IoT (PatrIoT) och är avgränsad till nätverkstrafik och enhetens programvara. På grund av juridiska begränsningar ingår det inte att analysera molnet och hårdvara ingår inte på grund av tidsbrist. Enheten visade sig använda standardlösenord för sin ONVIF-tjänst men tjänsten måste aktiveras av användaren och det är möjligt att ändra lösenordet via mobilapplikationen om användaren kan gissa sig till standardlösenordet. Enheten var mottaglig för tre olika DoS-attacker. Två av dem fick kameran att krasha och starta om varav en av dem kunde återupprepas för att hålla enheten offline så länge som önskades. Det var möjligt att identifiera de paket som skickades från kameran när den skulle notifiera användare om upptäckta rörelser eller ljud. Även om vissa problem hittades verkade enheten vara säker i allmänhet med krypterad nätverkstrafik och minimalt exponerade tjänster.
102

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
103

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
104

An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks

Satam, Pratik January 2015 (has links)
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a larger network like the Internet via wireless communications. One widely used wireless communication standard is the IEEE 802.11 protocol, popularly called Wi-Fi. Over the years, the 802.11 has been upgraded to different versions. But most of these upgrades have been focused on the improvement of the throughput of the protocol and not enhancing the security of the protocol, thus leaving the protocol vulnerable to attacks. The goal of this research is to develop and implement an intrusion detection system based on anomaly behavior analysis that can detect accurately attacks on the Wi-Fi networks and track the location of the attacker. As a part of this thesis we present two architectures to develop an anomaly based intrusion detection system for single access point and distributed Wi-Fi networks. These architectures can detect attacks on Wi-Fi networks, classify the attacks and track the location of the attacker once the attack has been detected. The system uses statistical and probability techniques associated with temporal wireless protocol transitions, that we refer to as Wireless Flows (Wflows). The Wflows are modeled and stored as a sequence of n-grams within a given period of analysis. We studied two approaches to track the location of the attacker. In the first approach, we use a clustering approach to generate power maps that can be used to track the location of the user accessing the Wi-Fi network. In the second approach, we use classification algorithms to track the location of the user from a Central Controller Unit. Experimental results show that the attack detection and classification algorithms generate no false positives and no false negatives even when the Wi-Fi network has high frame drop rates. The Clustering approach for location tracking was found to perform highly accurate in static environments (81% accuracy) but the performance rapidly deteriorates with the changes in the environment. While the classification algorithm to track the location of the user at the Central Controller/RADIUS server was seen to perform with lesser accuracy then the clustering approach (76% accuracy) but the system's ability to track the location of the user deteriorated less rapidly with changes in the operating environment.
105

Evaluation of Different Radio-Based Indoor Positioning Methods

Sven, Ahlberg January 2014 (has links)
No description available.
106

Interference mitigation strategy design and applications for wireless sensor networks

Yao, Fang January 2010 (has links)
The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard presents a very useful technology for implementing low-cost, low-power, wireless sensor networks. Its main focus, which is to applications requiring simple wireless connectivity with relaxed throughout and latency requirements, makes it suitable for connecting devices that have not been networked, such as industrial and control instrumentation equipments, agricultural equipments, vehicular equipments, and home appliances. Its usage of the license-free 2.4 GHz frequency band makes the technique successful for fast and worldwide market deployments. However, concerns about interference have arisen due to the presence of other wireless technologies using the same spectrum. Although the IEEE 802.15.4 standard has provided some mechanisms, to enhance capability to coexist with other wireless devices operating on the same frequency band, including Carrier Sensor Multiple Access (CSMA), Clear Channel Assessment (CCA), channel alignment, and low duty cycle, it is essential to design and implement adjustable mechanisms for an IEEE 802.15.4 based system integrated into a practical application to deal with interference which changes randomly over time. Among the potential interfering systems (Wi-Fi, Bluetooth, cordless phones, microwave ovens, wireless headsets, etc) which work on the same Industrial, Scientific, and Medical (ISM) frequency band, Wi-Fi systems (IEEE 802.11 technique) have attracted most concerns because of their high transmission power and large deployment in both residential and office environments. This thesis aims to propose a methodology for IEEE 802.15.4 wireless systems to adopt proper adjustment in order to mitigate the effect of interference caused by IEEE 802.11 systems through energy detection, channel agility and data recovery. The contribution of this thesis consists of five parts. Firstly, a strategy is proposed to enable IEEE 802.15.4 systems to maintain normal communications using the means of consecutive transmissions, when the system s default mechanism of retransmission is insufficient to ensure successful rate due to the occurrence of Wi-Fi interference. Secondly, a novel strategy is proposed to use a feasible way for IEEE 802.15.4 systems to estimate the interference pattern, and accordingly adjust system parameters for the purpose of achieving optimized communication effectiveness during time of interference without relying on hardware changes and IEEE 802.15.4 protocol modifications. Thirdly, a data recovery mechanism is proposed for transport control to be applied for recovering lost data by associating with the proposed strategies to ensure the data integrity when IEEE 802.15.4 systems are suffering from interference. Fourthly, a practical case is studied to discuss how to design a sustainable system for home automation application constructed on the basis of IEEE 802.15.4 technique. Finally, a comprehensive design is proposed to enable the implementation of an interference mitigation strategy for IEEE 802.15.4 based ad hoc WSNs within a structure of building fire safety monitoring system. The proposed strategies and system designs are demonstrated mainly through theoretical analysis and experimental tests. The results obtained from the experimental tests have verified that the interference caused by an IEEE 802.11 system on an IEEE 802.15.4 system can be effectively mitigated through adjusting IEEE 802.15.4 system s parameters cooperating with interference pattern estimation. The proposed methods are suitable to be integrated into a system-level solution for an IEEE 802.15.4 system to deal with interference, which is also applicable to those wireless systems facing similar interference issues to enable the development of efficient mitigation strategies.
107

Aplikace pro definování pokrytí bezdrátových připojení ISP / Application for Wireless ISP Providers

Naibrt, Tomáš Unknown Date (has links)
The aim of this work is to examine the application Topocoding API and Google Maps API. Analyze system requirements to define the coverage of wireless connectivity to allow the ISP so as to allow the ISP to file AP and customers, as well as exploring the possibilities of joining the AP ISP and view coverage maps. Further, this application design, implement and test.
108

Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

Nykvist, Carl, Larsson, Martin January 2019 (has links)
The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). The LPIDS was implemented and tested on the hardware platforms Wi-Fi Pineapple and Raspberry Pi. To evaluate and test the LPIDS as well as the algorithms, performance metrics such as throughput, response time and power consumption are considered. The experimental results reveal that Aho-Corasick performed better than KMP throughout the majority of the process, but KMP was typically faster in the beginning with fewer rules. Similarly, Raspberry Pi shows remarkably higher performance than Wi-Fi Pineapple in all of the measurements. Moreover, we compared the throughput between LPIDS and Snort. It was concluded that the throughput was significantly higher for LPIDS when most of the rules do not include content parameters. This thesis concludes that due to computational complexity and slow hardware processing capabilities of Wi-Fi Pineapple, it could not become suitable IDS in the presence of different pattern matching strategies. Finally, we propose a modification of Snort to increase the throughput of the system.
109

Application for selection of Bluetooth or WLAN

Svenjeby, Jonatan, Jönsson, Richard January 2019 (has links)
Wireless communication is important in data transportation between devices. It is as ever important to find the best connection fitted for the users specific requirements. This process can be a hassle and having an application testing all the options could save both time and resources. This project involves solving mentioned problem and to create an application implementing the solution. A method of recommending a connection is to measure different metrics e.g throughput and packet loss for Bluetooth (BT) and each channel on 2.4GHz and 5GHz Wireless Area Network (WLAN). By using an appropriate algorithm to rate the connections a result ranging from best to worst can be displayed to the user. Limitations on metrics can be inputted by the user to tailor the result to match user requirements. The application is based on Hardware Meets Software (HMS) product Anybus Wireless Bridge II. With a Telnet connection Attention-commands (AT-commands) can be used to configure and utilize the modules e.g measure signal strength. Third-party services POCO and iPerf are used to measure other metrics e.g throughput and latency. C++ and Visual Studio was used to develop the application. In accordance to the test specification the projected resulted in a successfully working application. Tests prove that with interference on a channel results in a worse rating and that other channels that are unaffected gets a higher ranking on the list. There is still room for improvement regarding exception handling when connection timeouts happen due to loss of signal.
110

An Application for the Detection of Signal Strength for ESP8266 Position

Pourshirazi, Aida 01 July 2017 (has links)
Sinkholes are hazardous to buildings and their occupants, so a sensing device that can monitor underground changes is vital. Void Technology, developed in the Research and Development Center at Western Kentucky University, is creating a device that can improve monitoring for any movement underground. This device, created by Void Technology, is equipped with ESP8266, which is a Wi-Fi module that can send its information to the router in a wireless network. The focus of this thesis is on designing and developing an IOS framework application to show the signal strength capabilities in different buildings to find the optimum placement of the Void Technology devices. Each building, based on various construction materials, had different attenuations that could cause signal loss from the application to the ESP82266. The optimum place was found with this designed application. From this test experiment, it can be concluded that the application can show the signal strength based dBm. Thus, this new application is cost-effective as well as user friendly and which can help both the installer and homeowner to find the best position for installing The Void Technology with optimum signal strength.

Page generated in 0.0256 seconds