fullrecord |
[{"key": "dc.contributor.advisor", "value": "Frantti, Tapio", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Markkanen, Veikko", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-05-30T05:37:30Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-05-30T05:37:30Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/95346", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Challenges in resource constrained IoT networks are driven by the miniaturization of purpose-specific hardware and the imperative for cost-efficiency. These characteristics make traditional security solutions, which focus on securing individual devices, unrealistic. Instead, decentralized solutions that leverage the collective resources of a network must be considered. For these solutions, key enablers include self-configuration, scalability, resilience to extreme dynamics, and the overall sustainability and reliability of the network, suggesting the ad hoc paradigm, an attractive foundation for development. Therefore, the objective of this master\u2019s thesis is to examine the feasibility of ad hoc networking in providing a reliable communication framework for sharing security information between resource constrained devices. \nThe research consists of the examination of major challenges in resource constrained IoT systems and exploration of promising solutions from academic literature. It details various categories of ad hoc networking, key standards, and routing protocols. Additionally, a simulation artifact was developed to assess the feasibility of using ad hoc networking to distribute security information among resource constrained devices across different network sizes. The findings indicate that ad hoc networking is an efficient and scalable framework for sharing security information in terms of throughput, latency, and the overall reliability of the introduced security functionality. The key factors affecting these values could be identified as the physical topology of the network and the availability of existing routes between nodes. Furthermore, the alignment of ad hoc networking with academically proposed solutions was affirmed. \nThe results from this thesis can provide a reference base for further steps in validating ad hoc networking as a suitable communication framework upon which more complex, decentralized security functionalities can be implemented.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Resurssivajeisten IoT-verkkojen turvallisuushaasteet juontavat juurensa tarkasti rajattuun teht\u00e4v\u00e4\u00e4n suunniteltujen laitteiden optimoinnista kustannustehokkuutta varten. T\u00e4ss\u00e4 ymp\u00e4rist\u00f6ss\u00e4 laitteiden suojaaminen perinteisin, yksitt\u00e4iseen laitteeseen keskittyvin menetelmin, ei ole realistista. Vastuu kyberturvasta tulisi hajauttaa verkon kollektiivisia resursseja hy\u00f6dynt\u00e4en. Hajautettujen menetelmien ytimess\u00e4 on laitteiden kyky muodostaa autonomisia, skaalautuvia ja kest\u00e4vi\u00e4 verkkoja, joiden rakentamiseksi ad hoc -verkkoteknologia tarjoaa hedelm\u00e4llisen perustan. N\u00e4in ollen, t\u00e4m\u00e4n pro gradu -tutkimuksen tavoitteena on kartoittaa ad hoc -verkkoteknologian soveltuvuutta turvallisuustiedon jakamiseen resurssivajeesta k\u00e4rsivien laitteiden kesken. \nTutkimus koostuu IoT-verkoille tyypillisten haasteiden tunnistamisesta, sek\u00e4 akateemisessa kirjallisuudessa esitettyjen ratkaisujen k\u00e4sittelyst\u00e4. Se erittelee ad hoc -verkkojen kategoriat, keskeisi\u00e4 standardeja sek\u00e4 reititysprotokollia, ja tutkii niiden soveltuvuutta IoT-ymp\u00e4rist\u00f6ss\u00e4. Lis\u00e4ksi tutkimuksessa kehitettiin simulaatioartefakti, jolla arvioitiin ad hoc -verkkoteknologian kyky\u00e4 jakaa turvallisuustietoa erikokoisissa IoT-sensoriverkoissa. Tulokset osoittivat ad hoc -verkkoteknologian tukevan turvallisuustiedon tehokasta ja skaalautuvaa jakamista, kapasiteetin, viiveen ja toimintavarmuuden n\u00e4k\u00f6kulmista. Verkon fyysinen topologia ja reittien olemassaolo tunnistettiin merkitt\u00e4v\u00e4ksi tekij\u00f6iksi suorituskyvyn kannalta. \nT\u00e4m\u00e4n tutkimuksen tulokset tarjoavat pohjan ad hoc -verkkoteknologian validoimiseksi viitekehyksen\u00e4, jonka p\u00e4\u00e4lle voidaan toteuttaa monimutkaisempia, hajautettuja turvallisuustoiminnallisuuksia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-05-30T05:37:30Z\r\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-05-30T05:37:30Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "77", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Sharing Security Information Between Resource Constrained Network Nodes", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202405304109", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Cyber Security", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|