Έμπιστα περιβάλλοντα για πράγματα του διαδικτύου
Trusted environments for Internet of Things

Master Thesis
Author
Αζναουρίδης, Χρήστος Νεκτάριος
Date
2019-09Advisor
Λαμπρινουδάκης, ΚωνσταντίνοςView/ Open
Keywords
Trusted execution environment ; TEE ; IoT ; Internet of ThingsAbstract
Over the last few years the adequacy of efficient wireless protocols, improved sensors, cheaper processors, established companies developing the necessary management and application software have finally transformed the concept of Internet of Things (IoT) into a master. current.
The term 'Internet of Things' also known as 'Internet of Objects' refers to the use of standard Internet protocols to create a secure human-to-thing or thing-to-thing communication environment on embedded networks. Schematically the term describes three things and their harmonious co-operation. The first is the Objects integrated with the sensors, the second is the Data Processing Systems and the third is the Network through which the data is exchanged and the communication is implemented. Essentially, it is a network of physical objects in communication, which enables internet to collect and exchange data between these objects.
The rapid development of connected internet devices is estimated to range between 25 and 50 billion euros by the end of 2020. These will include all home appliances, health and fitness equipment, industrial equipment , distributed sensors, cars, and a number of new devices under development.
This new technological age, where every small device around us will be connected to the Internet, requires the development of Cyber Security at a rate at least equal to the growth rate of new interconnected devices in order to avoid issues with significant impact.
As part of this thesis, cyber security is presented and analyzed in the case of devices that have adopted and utilize IoT technology. The first chapters of the study discuss each aspect of IoT technology and then refer to the models for connecting devices to web processing systems with the introduction of IoT technology. The next chapters refer to the attack surface and the most vulnerable (vulnerable) points of the Internet of Things, as well as the countermeasures that may be undertaken for protection, as well as the methodologies for conducting penetration tests.
The postgraduate thesis also includes and analyzes the need to develop a cybersecurity framework that addresses and applies to devices adopting Internet of Things technology, any IoT vulnerabilities, and a case study where the findings of vulnerable devices will be presented. IoT. Security challenges such as privacy and privacy issues are thoroughly documented and analyzed in every respect.
Αποστολή σχολίων
Ιστορικό
Αποθηκευμένες
Κοινότητα