Esineiden internetin turvallisuuden parantaminen lohkoketjulla

Tässä tutkielmassa tarkastellaan, mitkä tekijät johtavat esineiden internet-laitteiden turvattomuuteen ja miksi ongelmaan ei ole yksinkertaista ratkaisua. Tähän ongelmaan selvitetään, voidaanko lohkoketjua soveltaa esineiden internet-laitteiden ja niiden tietojen turvaamiseksi. Tutkielmassa paneudut...

Full description

Bibliographic Details
Main Author: Komppa, Atte
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2021
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/75825
_version_ 1826225799150174208
author Komppa, Atte
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Komppa, Atte Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Komppa, Atte Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Komppa, Atte
datasource_str_mv jyx
description Tässä tutkielmassa tarkastellaan, mitkä tekijät johtavat esineiden internet-laitteiden turvattomuuteen ja miksi ongelmaan ei ole yksinkertaista ratkaisua. Tähän ongelmaan selvitetään, voidaanko lohkoketjua soveltaa esineiden internet-laitteiden ja niiden tietojen turvaamiseksi. Tutkielmassa paneudutaan esineiden internetin tietoturvan nykytilanteeseen sekä lohkoketjun mahdollistamiin muutoksiin. Aihetta käydään läpi teknologioiden avaamisilla sekä antamalla konkreettisia esimerkkejä aiheista. This survey clarifies what are the factors that lead to the insecurity of IoT and why there is not a straight solution for these security problems. To solve the problem, blockchain is being studied, can it be used with IoT to secure devices and their informations. This survey focuses on information security of IoT at this moment and the changes that blockchain can offer for IoT. The topic is covered by introducing the technologies and by giving concrete examples.
first_indexed 2024-09-11T08:49:43Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Rossi, Tuomo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Komppa, Atte", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2021-05-21T04:27:34Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2021-05-21T04:27:34Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2021", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/75825", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 tutkielmassa tarkastellaan, mitk\u00e4 tekij\u00e4t johtavat esineiden internet-laitteiden\nturvattomuuteen ja miksi ongelmaan ei ole yksinkertaista ratkaisua. T\u00e4h\u00e4n ongelmaan selvitet\u00e4\u00e4n, voidaanko lohkoketjua soveltaa esineiden internet-laitteiden ja niiden tietojen turvaamiseksi. Tutkielmassa paneudutaan esineiden internetin tietoturvan nykytilanteeseen sek\u00e4 lohkoketjun mahdollistamiin muutoksiin. Aihetta k\u00e4yd\u00e4\u00e4n l\u00e4pi teknologioiden avaamisilla\nsek\u00e4 antamalla konkreettisia esimerkkej\u00e4 aiheista.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This survey clarifies what are the factors that lead to the insecurity of IoT and why\nthere is not a straight solution for these security problems. To solve the problem, blockchain is being studied, can it be used with IoT to secure devices and their informations. This survey focuses on information security of IoT at this moment and the changes that blockchain can offer for IoT. The topic is covered by introducing the technologies and by giving concrete examples.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2021-05-21T04:27:34Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2021-05-21T04:27:34Z (GMT). No. of bitstreams: 0\n Previous issue date: 2021", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "23", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Esineiden internetin turvallisuuden parantaminen lohkoketjulla", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202105213086", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "lohkoketjut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_75825
language fin
last_indexed 2025-02-18T10:56:20Z
main_date 2021-01-01T00:00:00Z
main_date_str 2021
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/c6119dda-faea-4aaf-aa58-c6ec5b595c03\/download","text":"URN:NBN:fi:jyu-202105213086.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2021
record_format qdc
source_str_mv jyx
spellingShingle Komppa, Atte Esineiden internetin turvallisuuden parantaminen lohkoketjulla Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus turvallisuus lohkoketjut esineiden internet
title Esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_full Esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_fullStr Esineiden internetin turvallisuuden parantaminen lohkoketjulla Esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_full_unstemmed Esineiden internetin turvallisuuden parantaminen lohkoketjulla Esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_short Esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_sort esineiden internetin turvallisuuden parantaminen lohkoketjulla
title_txtP Esineiden internetin turvallisuuden parantaminen lohkoketjulla
topic Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus turvallisuus lohkoketjut esineiden internet
topic_facet 602 Mathematical Information Technology Tietotekniikka esineiden internet kyberturvallisuus lohkoketjut turvallisuus
url https://jyx.jyu.fi/handle/123456789/75825 http://www.urn.fi/URN:NBN:fi:jyu-202105213086
work_keys_str_mv AT komppaatte esineideninternetinturvallisuudenparantaminenlohkoketjulla