fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Pasanen, Mauno", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-11-09T06:48:35Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-11-09T06:48:35Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/83831", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Teknologian kehittymisen my\u00f6t\u00e4 arkip\u00e4iv\u00e4iset laitteet, kuten kodinkoneet ja ajoneuvot, muuttuvat \u00e4lykk\u00e4iksi esineiden internetin toimijoiksi. Siirrett\u00e4v\u00e4n\u00e4 voi olla tietoja miljardeista laitteista, tai on k\u00e4sitelt\u00e4v\u00e4 tietoa ilman merkitt\u00e4v\u00e4\u00e4 viivett\u00e4. Perinteisen datakeskusvetoisen pilvilaskennan t\u00f6rm\u00e4tess\u00e4 haasteisiin n\u00e4it\u00e4 ratkomaan on kehittynyt pilvilaskennan osa-alue reunalaskenta, joka k\u00e4sitteen\u00e4 tuo tiedon k\u00e4sittelyn laitteeseen tai laitteen l\u00e4helle. Reunalaskennan laajeneminen on kasvattanut my\u00f6s reaalimaailman turvallisuusuhkia, ja esimerkkej\u00e4 miljoonien laitteiden tai yksitt\u00e4isten ajoneuvojen haltuunotosta on lukuisia. Tietoturvan toteutuneet haasteet vaikuttavat laajasti miljoonien ihmisten el\u00e4m\u00e4\u00e4n, liiketoimintaan ja yhteiskunnan\ntoimivuuteen.\n\nTutkielmassa kootaan yhteen reunalaskennan tietoturvaan kohdistuvia haasteita ja k\u00e4sitell\u00e4\u00e4n ongelmakohtiin kehitettyj\u00e4 ratkaisuja keskittyen autoihin reunalaitteina. Moderni auto on monipuolinen reunatoimija, johon kohdistuneiden hy\u00f6kk\u00e4ysten m\u00e4\u00e4r\u00e4 on Chattopadhyay, Lam ja Tavva (2021) mukaan yli kuusinkertaistunut viime vuosina. Tutkielmassa tehd\u00e4\u00e4n ajoneuvon hy\u00f6kk\u00e4ysrajapintojen l\u00e4pik\u00e4ynti ja uhka-analyysi. L\u00f6yd\u00f6sten perusteella analysoidaan\ntarkemmin kahden, osittain itseajavan ja verkottuneen, auton et\u00e4hallintaohjelmisto ja jaettu verkkoyhteys suorittamalla sek\u00e4 v\u00e4limieshy\u00f6kk\u00e4ys ett\u00e4 verkkoskannaus, ja analysoimalla verkkoliikenne. Tuloksista on n\u00e4ht\u00e4viss\u00e4, ett\u00e4 valmistajat ovat huomioineet ilmiselv\u00e4t riskit. Analyysiss\u00e4 paljastui kuitenkin haavoittuvaisuuksia ja heikkouksia, joihin tehtiin suosituksia, joilla yksityisyyden suojaa voitaisiin parantaa, hy\u00f6kk\u00e4yslinjoja sulkea ja v\u00e4\u00e4rink\u00e4yt\u00f6sten\nmahdollisuutta pienent\u00e4\u00e4. Autojen ollessa pitk\u00e4ik\u00e4isi\u00e4 hy\u00f6dykkeit\u00e4, niiden suojauksen pit\u00e4\u00e4 kest\u00e4\u00e4 sek\u00e4 nykyiset ett\u00e4 tulevaisuuden kehittyneemm\u00e4t hy\u00f6kk\u00e4ystekniikat.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "With the development of technology, everyday devices, such as home appliances and vehicles, are becoming smart Internet of Things players. The data transfer amount can be large from billions of devices, or data must be processed without significant delay. As traditional data center-driven cloud computing faces challenges, the edge computing has evolved to bring data processing to or near the device. The expansion of edge computing has also increased real-world security threats, with numerous examples of hijacking millions of devices or individual vehicles. The realized challenges of information security have a far-reaching impact on the lives of millions of people, businesses and functioning of society.\n\nThis thesis brings together the challenges of edge computing security and addresses the solutions developed to the problem areas, focusing on cars as edge devices. The modern car is a versatile edge device, and the number of attacks against them have grown over sixfold in recent years according the Chattopadhyay, Lam ja Tavva (2021). Thesis reviews the vehicle\u2019s attack interfaces and performs a threat analysis. Based on the findings, the remote\nmanagement software and shared network connection of the two self-driven and connected cars are analyzed in more detail by performing a man-in-the-middle attack and a network scan, and analyzing the network traffic. The results show that the manufacturers have taken into account the obvious risks. However, the analysis revealed vulnerabilities and weaknesses, which could be closed, privacy protection could be improved and potential for abuse\nsignificantly reduced with the thesis recommendations. As cars are long-lived commodities, their protection must withstand both current and future\u2019s more advanced attack technologies.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2022-11-09T06:48:35Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-11-09T06:48:35Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "88", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "sumulaskenta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvilaskenta. itseajava", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Internet of Things", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "fog computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "edge computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cloud computing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "security", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vehicle", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "car", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "self-driving", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Reunalaskennan tietoturva nykyaikaisessa ajoneuvossa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202211095132", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietojenk\u00e4sittelytiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Computer Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "autot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "ajoneuvot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "reunalaskenta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "autot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "riskianalyysi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|