fullrecord |
[{"key": "dc.contributor.advisor", "value": "Honkanen, Risto", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Haapakoski, Aki", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2018-09-24T05:27:46Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2018-09-24T05:27:46Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2018", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/59625", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4n ty\u00f6n tarkoituksena on selvitt\u00e4\u00e4 puettavissa IoT-laitteissa k\u00e4ytettyjen yleisten protokollien soveltuvuutta puettaviin IoT-laitteisiin sek\u00e4 selvitt\u00e4\u00e4 kuinka protokollissa olevilta tietoturvaongelmilta voitaisiin suojautua.\nTy\u00f6n alkuosassa annetaan kirjallisuuskatsauksen kautta kuvaus puettavista IoTlaitteista sek\u00e4 esitell\u00e4\u00e4n nelj\u00e4 IoT-laitteiden yleisess\u00e4 k\u00e4yt\u00f6ss\u00e4 olevaa verkkoprotokollaa (Bluetooth, Wi-Fi, NFC ja Zigbee). Ty\u00f6n loppuosassa toteutetaan kokeellisin keinoin kolme erilaista hy\u00f6kk\u00e4yst\u00e4 protokollia kohtaan. Ty\u00f6ss\u00e4 esitell\u00e4\u00e4n hy\u00f6kk\u00e4ys Bluetooth-yhteyden paritukseen, hy\u00f6kk\u00e4ys Wi-Fi-verkkoliikennett\u00e4 kohtaan sek\u00e4 NFC-kortin tietojen kaappaaminen.\nTy\u00f6n tuloksina huomattiin, ett\u00e4 useissa IoT-laitteissa on k\u00e4yt\u00f6ss\u00e4 vanhoja protokollia, joissa on tunnettuja tietoturvapuutteita. Esitellyist\u00e4 hy\u00f6kk\u00e4yksist\u00e4 todettiin, ett\u00e4 tietoturvallisuutta olisi mahdollista parantaa ottamalla k\u00e4ytt\u00f6\u00f6n salausta. Laitteet hy\u00f6tyisiv\u00e4t protokollan ulkopuolisesta lis\u00e4suojauksesta ja vanhentuneitakin protokollia olisi mahdollista suojata erillisell\u00e4 ohjelmistotason suojauksella. Edelleen on k\u00e4yt\u00f6ss\u00e4 paljon palveluita ja laitteita, jotka eiv\u00e4t k\u00e4yt\u00e4 salausta, vaikka salauksella pystytt\u00e4isiin hankaloittamaan laitteisiin kohdistuvia hy\u00f6kk\u00e4yksi\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The purpose of this work is to study wearable IoT devices and how common protocols suit their needs. The purpose is also to study how the security of the protocols could be increased.\nThe first part of this work provides a brief description of wearable IoT devices through literature review. The work introduces four commonly used network protocols (Bluetooth, Wi-Fi, NFC and Zigbee) and their security situation. The latter part of this work introduces an experimental attack on Bluetooth connectivity, an attack on Wi-Fi network and an attack where NFC data is captured from a NFC card.\nAs a result of this work it was noted that many IoT devices use outdated protocols that have kkown security flaws. Introduced attacks indicated that security could be improved by taking better use of encryption. The devices would benefit from separate software level security measures and even outdated protocols could be protected with it. There are still a lot of services and devices that do not use encryption, even if it could hinder attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Riitta Pitk\u00e4nen (rpitkane@jyu.fi) on 2018-09-24T05:27:45Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2018-09-24T05:27:46Z (GMT). No. of bitstreams: 0\n Previous issue date: 2018", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "80", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "puettavat laitteet", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Katsaus puettaviin IoT-laitteisiin, yleisiin protokolliin ja tietoturvatilanteeseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201809244212", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Bluetooth", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "protokollat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|