Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita

Tässä tutkielmassa tutustutaan IoT-laitteisiin, sekä tapoihin ja teknologioihin joilla voitaisiin suorittaa sotilaan monitorointia taistelukentällä. Tutkielman tavoitteena on ollut perehtyä IoT-teknologiaan, IoT-monitorointiin ja sotilaiden monitorointiin taistelukentällä. Tutkielmassa käydään läpi...

Full description

Bibliographic Details
Main Author: Helkala, Joel
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/73143
_version_ 1826225807267201024
author Helkala, Joel
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Helkala, Joel Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Helkala, Joel Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Helkala, Joel
datasource_str_mv jyx
description Tässä tutkielmassa tutustutaan IoT-laitteisiin, sekä tapoihin ja teknologioihin joilla voitaisiin suorittaa sotilaan monitorointia taistelukentällä. Tutkielman tavoitteena on ollut perehtyä IoT-teknologiaan, IoT-monitorointiin ja sotilaiden monitorointiin taistelukentällä. Tutkielmassa käydään läpi optimaalisia kommunikaatioprotokollia sotilaan monitorointiin ja tämän hetkinen IoT:n tietoturvatilanne. IoT:n nopean kasvun on osoitettu aiheuttavan vakavia ongelmia tietoturvan alueella. Sotilaan monitorointiin on teknologiaa jo olemassa esimerkiksi terveydenhuollon alalla. Monitoroinnilla voidaan parantaa sotilaan turvallisuutta IoT-laitteiden keräämän datan avulla. In this thesis we will introduce IoT devices, methods and technologies that will enable us to perform monitoring of a soldier on the battlefield. The purpose of this thesis has been to get acquainted with IoT technology, IoT monitoring and soldier monitoring on the battlefield. In this thesis we will go over the optimal communication protocols and the current state of information security in the IoT. The rapid growth of IoT has been shown to increase the amount of security issues. The technology for soldier monitoring is already available, for example in the healthcare field. With monitoring we can enhance the safety of the soldiers with the help of the data collected by the IoT devices.
first_indexed 2024-09-11T08:50:58Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Helkala, Joel", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-14T10:01:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-14T10:01:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73143", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tutustutaan IoT-laitteisiin, sek\u00e4 tapoihin ja teknologioihin joilla voitaisiin suorittaa sotilaan monitorointia taistelukent\u00e4ll\u00e4. Tutkielman tavoitteena on ollut perehty\u00e4 IoT-teknologiaan, IoT-monitorointiin ja sotilaiden monitorointiin taistelukent\u00e4ll\u00e4. Tutkielmassa k\u00e4yd\u00e4\u00e4n l\u00e4pi optimaalisia kommunikaatioprotokollia sotilaan monitorointiin ja t\u00e4m\u00e4n hetkinen IoT:n tietoturvatilanne. IoT:n nopean kasvun on osoitettu aiheuttavan vakavia ongelmia tietoturvan alueella. Sotilaan monitorointiin on teknologiaa jo olemassa esimerkiksi terveydenhuollon alalla. Monitoroinnilla voidaan parantaa sotilaan turvallisuutta IoT-laitteiden ker\u00e4\u00e4m\u00e4n datan avulla.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In this thesis we will introduce IoT devices, methods and technologies that will enable us to perform monitoring of a soldier on the battlefield. The purpose of this thesis has been to get acquainted with IoT technology, IoT monitoring and soldier monitoring on the battlefield. In this thesis we will go over the optimal communication protocols and the current state of information security in the IoT. The rapid growth of IoT has been shown to increase the amount of security issues. The technology for soldier monitoring is already available, for example in the healthcare field. With monitoring we can enhance the safety of the soldiers with the help of the data collected by the IoT devices.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2020-12-14T10:01:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-14T10:01:35Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "24", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "taistelukentt\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Sotilaan monitorointi taistelukent\u00e4ll\u00e4 hy\u00f6dynt\u00e4en IoT-laitteita", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012147092", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "monitorointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sotilaat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "data", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "laitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_73143
language fin
last_indexed 2025-02-18T10:56:34Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/43bfa892-9a1f-49b5-bf58-dd3330acdd11\/download","text":"URN:NBN:fi:jyu-202012147092.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Helkala, Joel Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita taistelukenttä Tietotekniikka Mathematical Information Technology 602 monitorointi esineiden internet sotilaat data laitteet Internet
title Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
title_full Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
title_fullStr Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
title_full_unstemmed Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
title_short Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
title_sort sotilaan monitorointi taistelukentällä hyödyntäen iot laitteita
title_txtP Sotilaan monitorointi taistelukentällä hyödyntäen IoT-laitteita
topic taistelukenttä Tietotekniikka Mathematical Information Technology 602 monitorointi esineiden internet sotilaat data laitteet Internet
topic_facet 602 Internet Mathematical Information Technology Tietotekniikka data esineiden internet laitteet monitorointi sotilaat taistelukenttä
url https://jyx.jyu.fi/handle/123456789/73143 http://www.urn.fi/URN:NBN:fi:jyu-202012147092
work_keys_str_mv AT helkalajoel sotilaanmonitorointitaistelukentällähyödyntäeniotlaitteita