- document
-
Adriaanse, P.E.A. (author)With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...bachelor thesis 2021
- document
-
Eckhardt, Thomas (author)Wireless Sensor Networks(WSN's) are networks of sensor that wirelessly communicate to each other. The communication of these sensors needs to be secured to prevent leaking of potentially sensitive information of the data sent between the user, gateway and sensors. For WSN's lightweight authentication, protocols have been developed in order to...bachelor thesis 2021
- document
-
Alkan, Efe (author)Pseudo-random number generators are the essential part of many security protocols such as signature schemes, key-exchange protocols and encryption algorithms. The security of these protocols is usually dependent on the quality of the generators they use. The generation of unpredictable random numbers supplies refreshment to the protocols, which...bachelor thesis 2021
- document
-
Berendsen, Dan Dan (author)The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitive data the security for these devices is of greater importance. As these devices are connected with the internet being able to have secure communication is crucial. Some of the major aspects for secure communication are identification and message...bachelor thesis 2021
- document
-
Sluijter, Hans (author)An increasingly large amount of data is generated on the IoT. Widespread use of this data may help provide valuable insights and actionable triggers for new innovative services. To tap the potential of this increasing supply of data, a platform is needed. However in creating marketplaces for this data concerns regarding privacy and misuse of...bachelor thesis 2021
- document
-
de Klerk, Leon (author)The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...bachelor thesis 2021
- document
-
Beekhuizen, Michael (author)IoT devices have grown rapidly over the past few years. IoT devices are mostly connected to a central server that stores the data and handles end-to-end communication. Due to the increase of IoT devices, the latency with the server increases. Furthermore, when using a central server the data is at risk of being deleted or tampered with. To...bachelor thesis 2021
- document
-
Darbari, Shubhankar (author)The expansion of the Internet and wireless access has led to a widespread increase of Internet of Things applications. These smart devices are becoming a daily aspect of our lives. All the convenient and automated services provided by smart devices come from a centralized service provider. This service provider has access to all the personal...bachelor thesis 2021