fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mulkahainen, Markus", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-04-05T14:16:05Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-04-05T14:16:05Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49257", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Radiotaajuinen et\u00e4tunnistus (RFID, engl. radio frequency identification) on viivakoodiin verrattavissa oleva radiotaajuuksilla toimiva et\u00e4tunnistusj\u00e4rjestelm\u00e4. RFID on er\u00e4s esineiden Internetin aistitason tekniikoista, ja sit\u00e4 voidaan k\u00e4ytt\u00e4\u00e4 esineiden v\u00e4liseen langattomaan tunnistukseen ja tiedonsiirtoon. Tutkielma esittelee tekniikkaan liittyvi\u00e4 tietoturvaongelmia ja mahdollisia ratkaisukeinoja. RFID-j\u00e4rjestelm\u00e4t ovat alttiita useille hy\u00f6kk\u00e4yksille, mutta niiden k\u00e4yt\u00f6st\u00e4 voi aiheutua my\u00f6s tahattomia ongelmatilanteita, muun muassa t\u00f6rm\u00e4yskonflikteja ja standardiongelmia. Radiotaajuisen et\u00e4tunnistuksen tietoturvaongelmia voidaan pyrki\u00e4 est\u00e4m\u00e4\u00e4n k\u00e4ytt\u00e4m\u00e4ll\u00e4 erilaisia tietoturvaprotokollia, joista esimerkkin\u00e4 tutkielmassa esitell\u00e4\u00e4n SRAC-autentikointiprotokolla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Radio frequency identification (RFID) is a system similar to barcode for identifying objects over a radio frequency interface. RFID is a common technology used in Internet of Things (IoT) devices for wireless communication and unique identification. This survey explores the security issues concerning RFID and describes their severities and possible solutions. RFID-systems are vulnerable to several attacks, and the usage of RFID can cause unintentional issues such as conflict collisions and standardizing problems. Some of the security issues concerning RFID can be prevented by using security protocols, such as SRAC authentication protocol which is described in the survey.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Markus Mulkahainen (mavemamu) on 2016-04-05 14:16:04.891772. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-04-05T14:16:05Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201604052010.pdf: 225778 bytes, checksum: def9131daf009d7b6a1a8eed420e50a6 (MD5)\nlicense.html: 4826 bytes, checksum: 43117bb70e0fb1e8025f2e92a4f820b5 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-04-05T14:16:05Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201604052010.pdf: 225778 bytes, checksum: def9131daf009d7b6a1a8eed420e50a6 (MD5)\nlicense.html: 4826 bytes, checksum: 43117bb70e0fb1e8025f2e92a4f820b5 (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "22", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Internet of Things", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "esineiden Internet", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "RFID", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "aistitaso", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Radiotaajuisen et\u00e4tunnistuksen tietoturvaongelmat esineiden Internetiss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201604052010", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-04-05T14:16:05Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|