Turvallisuusstrategiat IoT-ympäristöissä

Internet of Things (IoT) yhdistää päivittäin käyttämiämme laitteita globaaliin verkkoon mahdollistaen kommunikaation ja älykkäiden toimintojen automatisoinnin. IoT tarjoaa merkittävää potentiaalia useilla sektoreilla mutta sen laajamittainen käyttöönotto tuo mukanaan vakavia turvallisuushaasteita. T...

Full description

Bibliographic Details
Main Author: Koinsaari, Aaro
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/94865
_version_ 1826225802394468352
author Koinsaari, Aaro
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Koinsaari, Aaro Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Koinsaari, Aaro Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Koinsaari, Aaro
datasource_str_mv jyx
description Internet of Things (IoT) yhdistää päivittäin käyttämiämme laitteita globaaliin verkkoon mahdollistaen kommunikaation ja älykkäiden toimintojen automatisoinnin. IoT tarjoaa merkittävää potentiaalia useilla sektoreilla mutta sen laajamittainen käyttöönotto tuo mukanaan vakavia turvallisuushaasteita. Tässä tutkielmassa tarkastellaan näitä haasteita sekä keskustellaan strategioista, joilla pyritään parantamaan niitä etenkin verkkokerroksella. Tutkielma keskittyy verkkoliikenteen analysointiin, autentikointiin ja pääsynvalvontaan, lohkoketjuteknologiaan sekä reunalaskentaan. Lopuksi analysoidaan näiden menetelmien vahvuuksia ja heikkouksia yhdessä, jotta tulevaisuudessa voidaan kehittää monipuolisempia ja tehokkaampia turvallisuusratkaisuja IoT-verkkojen suojelemiseksi. The Internet of Things (IoT) rapidly integrates our daily devices into a global network, enabling communication and automated intelligent functions. IoT presents significant potential across various sectors but its widespread adoption introduces substantial security challenges. This paper reviews these challenges and discusses strategies to enhance IoT security, especially on the network layer. It focuses on network traffic analysis, authentication and access control, blockchain technology, and edge computing. Finally, the strengths and weaknesses of these methods are analyzed together to enhance the understanding and discussion of security solutions for protecting IoT networks in the future.
first_indexed 2024-09-11T08:50:58Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Juutinen, Sanna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Koinsaari, Aaro", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-15T10:13:25Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-15T10:13:25Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/94865", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Internet of Things (IoT) yhdist\u00e4\u00e4 p\u00e4ivitt\u00e4in k\u00e4ytt\u00e4mi\u00e4mme laitteita globaaliin verkkoon mahdollistaen kommunikaation ja \u00e4lykk\u00e4iden toimintojen automatisoinnin. IoT tarjoaa merkitt\u00e4v\u00e4\u00e4 potentiaalia useilla sektoreilla mutta sen laajamittainen k\u00e4ytt\u00f6\u00f6notto tuo mukanaan vakavia turvallisuushaasteita. T\u00e4ss\u00e4 tutkielmassa tarkastellaan n\u00e4it\u00e4 haasteita sek\u00e4 keskustellaan strategioista, joilla pyrit\u00e4\u00e4n parantamaan niit\u00e4 etenkin verkkokerroksella. Tutkielma keskittyy verkkoliikenteen analysointiin, autentikointiin ja p\u00e4\u00e4synvalvontaan, lohkoketjuteknologiaan sek\u00e4 reunalaskentaan. Lopuksi analysoidaan n\u00e4iden menetelmien vahvuuksia ja heikkouksia yhdess\u00e4, jotta tulevaisuudessa voidaan kehitt\u00e4\u00e4 monipuolisempia ja tehokkaampia turvallisuusratkaisuja IoT-verkkojen suojelemiseksi.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The Internet of Things (IoT) rapidly integrates our daily devices into a global network, enabling communication and automated intelligent functions. IoT presents significant potential across various sectors but its widespread adoption introduces substantial security challenges. This paper reviews these challenges and discusses strategies to enhance IoT security, especially on the network layer. It focuses on network traffic analysis, authentication and access control, blockchain technology, and edge computing. Finally, the strengths and weaknesses of these methods are analyzed together to enhance the understanding and discussion of security solutions for protecting IoT networks in the future.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-05-15T10:13:25Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-15T10:13:25Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "29", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "IoT-verkot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusstrategiat", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Turvallisuusstrategiat IoT-ymp\u00e4rist\u00f6iss\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405153632", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "esineiden internet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "teknologia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_94865
language fin
last_indexed 2025-02-18T10:56:34Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/fd0bd632-79d7-4b67-9301-cdf48b2304e8\/download","text":"URN:NBN:fi:jyu-202405153632.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Koinsaari, Aaro Turvallisuusstrategiat IoT-ympäristöissä IoT-verkot turvallisuusstrategiat Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus esineiden internet turvallisuus teknologia
title Turvallisuusstrategiat IoT-ympäristöissä
title_full Turvallisuusstrategiat IoT-ympäristöissä
title_fullStr Turvallisuusstrategiat IoT-ympäristöissä Turvallisuusstrategiat IoT-ympäristöissä
title_full_unstemmed Turvallisuusstrategiat IoT-ympäristöissä Turvallisuusstrategiat IoT-ympäristöissä
title_short Turvallisuusstrategiat IoT-ympäristöissä
title_sort turvallisuusstrategiat iot ympäristöissä
title_txtP Turvallisuusstrategiat IoT-ympäristöissä
topic IoT-verkot turvallisuusstrategiat Tietotekniikka Mathematical Information Technology 602 kyberturvallisuus esineiden internet turvallisuus teknologia
topic_facet 602 IoT-verkot Mathematical Information Technology Tietotekniikka esineiden internet kyberturvallisuus teknologia turvallisuus turvallisuusstrategiat
url https://jyx.jyu.fi/handle/123456789/94865 http://www.urn.fi/URN:NBN:fi:jyu-202405153632
work_keys_str_mv AT koinsaariaaro turvallisuusstrategiatiotympäristöissä