Search for dissertations about: "IOT security"
Showing result 1 - 5 of 47 swedish dissertations containing the words IOT security.
-
1. Public Key Infrastructure and its applications for resource-constrained IoT
Abstract : The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. READ MORE
-
2. Securing IoT Using Decentralized Trust Privacy and Identity Management
Abstract : The Internet of Things (IoT) is a multidisciplinary area where technology meets people, enriching their quality of life with an improved working environment and efficient productivity. As the number of IoT devices increases, many new technology areas are being integrated with the IoT. READ MORE
-
3. Lightweight Security Solutions for the Internet of Things
Abstract : The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs). This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operations. READ MORE
-
4. Principled Flow Tracking in IoT and Low-Level Applications
Abstract : Significant fractions of our lives are spent digitally, connected to and dependent on Internet-based applications, be it through the Web, mobile, or IoT. All such applications have access to and are entrusted with private user data, such as location, photos, browsing habits, private feed from social networks, or bank details. READ MORE
-
5. Robust and Efficient Federated Learning for IoT Security
Abstract : The widespread adoption of Internet of Things (IoT) devices has led to substantial progress across various industrial sectors, including healthcare, transportation, and manufacturing. However, these devices also introduce significant security vulnerabilities because they are often deployed without adequate security measures, making them susceptible to cyber threats. READ MORE