Hyppää sisältöön
    • Suomeksi
    • På svenska
    • In English
  • Suomi
  • Svenska
  • English
  • Kirjaudu
Hakuohjeet
JavaScript is disabled for your browser. Some features of this site may not work without it.
Näytä viite 
  •   Ammattikorkeakoulut
  • Vaasan ammattikorkeakoulu
  • Opinnäytetyöt (Avoin kokoelma)
  • Näytä viite
  •   Ammattikorkeakoulut
  • Vaasan ammattikorkeakoulu
  • Opinnäytetyöt (Avoin kokoelma)
  • Näytä viite

Overview of IoT Security Challenges, Authentication, Encryption and Blockchain Solution

Pham, Chinh (2019)

 
Avaa tiedosto
Pham Chinh final thesis.pdf (531.2Kt)
Lataukset: 


Pham, Chinh
2019
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2019113023678
Tiivistelmä
The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines, storage systems and other production facilities are capable of operating, exchanging information and triggering actions autonomously and independently. The growth of IoT is playing a key role in industry 4.0. However, the rapid increase in the number of IoT devices also raises serious concern about its effect on cybersecurity and privacy as these devices are typically limited in processing power, storage and network capacity, and therefore vulnerable to attacks.
This thesis paper surveys and presents major challenges for IoT security and available methods to protect the IoT system from being hacked or compromised. The security risks were reviewed, existing attacks and threats were categorised based on what layer in the IoT architecture they may affect and their motives. For the solution, the best and widely accepted methods for authenticating and encrypting data were presented. A new approach in IoT security with emerging technology, blockchain, is discussed.
There is not any perfect solution to solve all security issues. Therefore, the thesis explains the pros and cons of each method that IoT developers need to put in consideration before choosing the right method for their own system. However, recommendations are also given based on the research results.
Kokoelmat
  • Opinnäytetyöt (Avoin kokoelma)
Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste
 

Selaa kokoelmaa

NimekkeetTekijätJulkaisuajatKoulutusalatAsiasanatUusimmatKokoelmat

Henkilökunnalle

Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste