Title |
Daiktų interneto objektų identifikavimo metodų programiniame lygmenyje tyrimas / |
Translation of Title |
Research on methods of application level Iot objects identification. |
Authors |
Petkus, Gediminas |
Full Text |
|
Pages |
63 |
Keywords [eng] |
internet of things ; object identification ; object autentification ; object communication |
Abstract [eng] |
Problems that are faced on the field of internet of things are widely known worldwide. Many people nowadays can’t even imagine a life without some sort of a device developed in a field of internet of things. Should it be a video camera that focuses on movement, various sensors and measurement devices that inform about user activity on the field or various nature happening events such as weather changes. At first glance it all sounds quite charming. Internet of things encourages to ease off a user’s life in the world by automating various actions that a user produces on a daily basis. It would be quite naïve to think that technologies nowadays produce only a negative effect on the life quality we as users have. Quite frankly it also becomes a widely used tool for various forensic hackers to forge a system and do what is intended in the first place. There is quite a variety of situations when forensic cybercriminals by using their abilities enable themselves to disable various systems up work. By giving a server fake information from the controlling units for example some kind of a measurement unit corresponds data of current temperature in the room. If fake data would be transmitted for example high and then low periods of temperature increase and decrease the ventilation system would power on producing cold and hot airflow periods that would distract servers workflow and the server would collapse. In deepening the main cause of failure in the field of internet of things it would be wise to point out that a few of the main reasons why the field is vulnerable is that we have huge number of devices that have its purpose that they were developed in the first place to do. Having a huge scope of internet of things devices that surround us it becomes very difficult to identify and authenticate them thus how to verify the fact that the data that is being transferred at the moment to the server from where they are sent from a measurement device that is hocked up to a patient that monitors a patient’s heart beats is valid and not being transmitted by a forensic cybercriminal. It is quite possible to image a scenario like this whether the data that is sent is not valid the personal of this medical institution would have to provide medical assistance to a patient who does not need assistance at all because the data that was given by the server to the medical personal is forged but the medical personal does not know that and by providing unnecessary assistance the medical personal would cause damage to the patient’s body or even cause early death. Thus having the ability to properly identify and authenticate devices in the field of internet of things thematic of solving these kinds of problems. It is a problem that has to be dealt with in addition to increasing number of devices and their growing need based on the users perspective in the world we live today. Providing the ability to correctly identify and authenticate devices is a crucial part for a user to obtain because the devices that produce various task on a daily basis it’s a must to confirm that the data that is transferred between the controller and the server is valid and not forged. Let’s say that a user has a baby monitor with a video camera included in it. The device transfers data to a user about a toddler that is sleeping at home while the user is out of home and to be calm that the information that he sees from this device is valid thugs identified and authenticated thus providing positivity for a user that for example the video data that he sees is transmitted from a real camera that he has at home and not forged by a cybercriminal. The main object of master thesis is - Research on Methods of Application Level Internet of Things Objects Identification 7 Structure of work First part of the work is based on Research on Methods of Application Level IoT Objects Identification Analysis. Various identification methods must be analyzed and the security issues they have vulnerability to and the tools that can be implied to avoid these vulnerabilities. Second part provides a conception model of Research on Methods of Application Level Internet of Things Objects Identification. It contains system architecture model, client server based communication schemes and the method of object identification and authentication itself by communication mechanisms based on middleware layer principles, data exchange mechanisms, system usability guidelines. The illustrations are visualized by using graphical pictures developed using unified modeling language. Third part provides the results of the investigation theme. By the investigation period there is a deep perception analysis of Research on Methods of Application Level Internet of Things Objects Identification model. Based on the investigation the information gathered provides the data influence on a timespan basis compared to using and not using the intended method of device identification and authentication. In the end work conclusions are provided. |
Dissertation Institution |
Kauno technologijos universitetas. |
Type |
Master thesis |
Language |
Lithuanian |
Publication date |
2017 |