Searched for: subject%3A%22IoT%22
(41 - 60 of 192)

Pages

document
Rodriguez, Elsa (author), Fukkink, Max (author), Parkin, S.E. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about persistent malware, which resides on persistent storage, requiring...
conference paper 2022
document
Köylü, T.C. (author), Caetano Garaffa, L. (author), Reinbrecht, Cezar (author), Zahedi, M.Z. (author), Hamdioui, S. (author), Taouil, M. (author)
The massive deployment of Internet of Things (IoT) devices makes them vulnerable against physical tampering attacks, such as fault injection. These kind of hardware attacks are very popular as they typically do not require complex equipment or high expertise. Hence, it is important that IoT devices are protected against them. In this work, we...
conference paper 2022
document
Barzgari, Mohammad (author), Ghafari, A. (author), Meghdadi, Masoud (author), Medi, Ali (author)
This article presents the theory and implementation of a quadrature and differential RF front-end receiver. Combining balun, low-noise amplifier (LNA), mixer, and oscillator in a single stage, the proposed circuit, named the Blixator, is well suited for low-power applications. The baseband's transimpedance amplifier (TIA) also shares part of...
journal article 2022
document
Saidi, Said Jawad (author), Matic, Srdjan (author), Gasser, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)
Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backendsÐthe focus of this paper. We propose a methodology to identify and locate them...
conference paper 2022
document
Shariq, Mohd (author), Singh, Karan (author), Lal, C. (author), Conti, M. (author), Khan, Tayyab (author)
Internet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and uniquely identifies the tagged objects without a direct line of sight. However, the research community had...
journal article 2022
document
Tanabe, Rui (author), Watanabe, Tsuyufumi (author), Fujita, Akira (author), Isawa, Ryoichi (author), Hernandez Ganan, C. (author), van Eeten, M.J.G. (author), Yoshioka, Katsunari (author), Matsumoto, Tsutomu (author)
Large botnets made up of Internet-of-Things (IoT) devices have a steady presence in the threat landscape since 2016. However, it has not explained how attackers maintain control over their botnets. In this paper, we present a long-term analysis of the infrastructure of IoT botnets based on 36 months of data gathered via honeypots and the...
journal article 2022
document
XU, QIXIANG (author)
Electric vehicle (EV) charging stations play an important role in the future development of the EV market. Uncoordinated charging will generate extra costs and bring unexpected stress to the grid. Multiple efficient charging strategies were proposed in past papers in order to solve the issues brought by uncoordinated charging. However, to put...
master thesis 2021
document
Popek, Oliwia (author)
Cities are the centres of communication, commerce, and culture. Although, more than 80% of global GDP is generated in urban districts, the cities consume two-thirds of global resources and produce more than 70% of global CO2 emissions. Rising population, escalating urban pollution, the effects of climate change urge cities to search for...
master thesis 2021
document
Poelman, Armando (author)
With the advent of a smart society and an era of connectivity, there remain a numerous amount of challenges yet to be solved. One of the key IoT innovations analysed in this research is known as Unmanned Aerial Systems (UAS). UAS, or drone technologies, allow carrying out repetitive and dangerous tasks with almost no human intervention or...
master thesis 2021
document
TANG, Philo (author)
This thesis proposes an ultra-low-power architecture for wireless Internet of Things end devices. The architecture enabled a prototype that can run a mainstream wireless protocol with an extremely limited power budget.
master thesis 2021
document
d' Estalenx, Antoine (author)
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these devices are completely unaware of the security risks that connecting these devices entail. Current...
master thesis 2021
document
Waleed Salaheldin Mustafa Nasr, Waleed (author)
With the advancements in technology and the enforcement of governmental regulations and incentives, the share of electric vehicles (EVs) in the mobility sector is on the rise. Although this aids the transition into a greener future with net-zero carbon emissions, the increase in EV penetration rates can have immense impacts on the grid and its...
master thesis 2021
document
de Roon, Tom (author)
Connecting ‘things’ like a doorbell, webcam, lamp, or other objects to the web to provide a service or control is called the Internet of Things (IoT). These devices contain vulnerabilities that form risks for the device user and possibly the network owner through their heterogeneity. The identified knowledge gap is the need for more IoT...
master thesis 2021
document
Tolsma, Pieter (author)
The Routing Protocol for Low-Power and Lossy Networks (RPL) has gained in popularity since the increased connectivity of everyday items to the Internet. One of the discovered attacks on RPL is the rank attack, which opens up possibilities for attackers to control traffic in the RPL network by spoofing their priority. Many solutions have been...
bachelor thesis 2021
document
Berendsen, Dan Dan (author)
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitive data the security for these devices is of greater importance. As these devices are connected with the internet being able to have secure communication is crucial. Some of the major aspects for secure communication are identification and message...
bachelor thesis 2021
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Stenhuis, Ruben (author)
While the Routing Protocol for Low Power and Lossy Networks (RPL) is built to support the constraints of low-powered devices, it struggles to meet the standards in security. Generally, low-powered devices are challenged with limited cryptography, tough key management, and interoperability issues. Despite these concerns, security is not only...
bachelor thesis 2021
document
Eckhardt, Thomas (author)
Wireless Sensor Networks(WSN's) are networks of sensor that wirelessly communicate to each other. The communication of these sensors needs to be secured to prevent leaking of potentially sensitive information of the data sent between the user, gateway and sensors. For WSN's lightweight authentication, protocols have been developed in order to...
bachelor thesis 2021
document
Duroyon, Marin (author)
Routing Protocol for Low Power and Lossy Networks (RPL) is a routing protocol for Internet of Things (IoT) devices with limited resources. As IoT is becoming prevalent, it is important to secure the underlying protocols that compose it such as RPL. This paper sought to avoid an RPL-specific routing attack by modifying the protocol's...
bachelor thesis 2021
document
Neeleman, Fimme (author)
The IPv6 routing protocol for low-power and lossy networks (RPL) is a routing protocol that is standardized for constrained devices. This standard only considers static nodes and consequently underperforms in networks with moving nodes. Several studies exist intending to mend this problem, but analyses of RPL's performance in mobile situations...
bachelor thesis 2021
Searched for: subject%3A%22IoT%22
(41 - 60 of 192)

Pages