fullrecord |
[{"key": "dc.contributor.advisor", "value": "Honkanen, Risto", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Ihalainen, Ville", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-01-18T06:28:44Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-01-18T06:28:44Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92866", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tutkielman tarkoituksena on selvitt\u00e4\u00e4, onko CoAP-protokolla tietoturvallinen. Tutkielmassa tarkastellaan CoAP-protokollan toimintaa, tietoturvaominaisuuksia, protokollaan kohdistuvia tietoturvauhkia, sek\u00e4 CoAP:n suojauksen toteuttavaa DTLS-protokollaa. Lis\u00e4ksi rakennetaan testausasetelma CoAP-protokollan tietoturvaominaisuuksien ja siihen kohdistuvien uhkien testaamiseksi. Testausasetelmassa CoAP-protokollaan kohdistetaan IP-osoitteen spoofing ja yksinkertainen vahvistushy\u00f6kk\u00e4ys, sek\u00e4 kaapataan ja tarkastellaan DTLS-suojattua liikennett\u00e4. Tutkimusaiheen taustoittamiseksi tarkastellaan CoAP:n lis\u00e4ksi lyhyesti IoT:ia, sen protokollapinoa ja siihen eri kerroksilla kohdistuvia tietoturvauhkia, sek\u00e4 CoAP:n kuljetuskerroksella k\u00e4ytt\u00e4m\u00e4\u00e4 UDP-protokollaa.\n\nTutkimusmenetelmin\u00e4 tutkielmassa sovelletaan kirjallisuuskatsausta ja konstruktiivista tutkimusmenetelm\u00e4\u00e4. Kirjallisuuskatsauksen menetelmin tarkastellaan aiemman tutkimuksen pohjalta CoAP-protokollan ominaisuuksia, tietoturvaominaisuuksia sek\u00e4 tietoturvauhkia. Testausosiossa k\u00e4ytett\u00e4v\u00e4n CoAP-protokollan tietoturvallisuuden testausasetelman luomisessa sovelletaan konstruktiivista tutkimusmenetelm\u00e4\u00e4. Tutkimuskysymykseen vastataan kirjallisuuskatsauksen ja testauksen tulokset yhdist\u00e4v\u00e4n analyysin perusteella.\n\nAnalyysin perusteella CoAP-protokolla on tietoturvallinen silloin, kun sen turvallisuustiloja sek\u00e4 DTLS-suojausta k\u00e4ytet\u00e4\u00e4n oikein uhkatasoon n\u00e4hden ja ohjelmistot sek\u00e4 kirjastot ovat p\u00e4ivitettyj\u00e4 siten, etteiv\u00e4t ne sis\u00e4ll\u00e4 tunnettuja haavoittuvuuksia. Lis\u00e4ksi salauksessa k\u00e4ytett\u00e4vien avainten generointi ja jakelu sek\u00e4 bootstrapping-prosessi laitteiden tai j\u00e4rjestelmien k\u00e4ytt\u00f6\u00f6nottojen yhteydess\u00e4 tulee toteuttaa turvallisesti. Jos DTLS-suojausta ei k\u00e4ytet\u00e4, on CoAP-protokolla altis useille eri hy\u00f6kk\u00e4yksille, kuten spoofing, vahvistushy\u00f6kk\u00e4ys ja protokollien v\u00e4liset hy\u00f6kk\u00e4ykset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Thesis aims to find out whether the CoAP protocol is secure in terms of information security. The thesis examines the operation and information security features of the CoAP protocol, information security threats to the protocol and the DTLS protocol which implements CoAP protocol's protection. In addition, a testing setup will be built for testing the security features of the CoAP protocol and potential threats against it. In the testing setup, IP-spoofing and simple amplification attack are tested against the CoAP protocol, as well as capturing and examination of DTLS-protected traffic. For background, in addition to CoAP, IoT and its protocol stack and the threats against it at different layers are briefly reviewed, as well as the UDP protocol used by CoAP in the transport layer.\n\nResearch methods used in the thesis are literature review and constructive research method. Based on previous research, characteristics, information security features and security threats of the CoAP protocol are examined using the methods of the literature review. A constructive research method is applied in creating the security testing setup for the CoAP protocol used in the testing section. The research question is answered based on an analysis that combines the results of the literature review and testing.\n\nBased on the analysis, the CoAP protocol is secure when security modes and DTLS protection are used correctly in relation to the threat level. Used CoAP implementations and libraries must also be updated so that they do not contain known vulnerabilities. In addition, the generation and distribution of the keys used in encryption, as well as the bootstrapping process in connection with the commissioning of the devices or the system, must be carried out securely. If DTLS protection is not used, the CoAP protocol is vulnerable to several different attacks, such as spoofing, amplification attacks and cross-protocol attacks.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2024-01-18T06:28:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-01-18T06:28:44Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "86", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "CoAP", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "DTLS", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "spoofing", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "vahvistushy\u00f6kk\u00e4ys", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "sovellusprotokolla", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "CoAP-protokollan tietoturva", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202401181362", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "protokollat (tietoliikenne)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|