Analysis of network security problems and solutions for machine to machine communications
Başlık çevirisi mevcut değil.
- Tez No: 432757
- Danışmanlar: DOÇ. DR. RESUL DAŞ
- Tez Türü: Yüksek Lisans
- Konular: Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol, Computer Engineering and Computer Science and Control
- Anahtar Kelimeler: Belirtilmemiş.
- Yıl: 2016
- Dil: İngilizce
- Üniversite: Fırat Üniversitesi
- Enstitü: Fen Bilimleri Enstitüsü
- Ana Bilim Dalı: Yazılım Mühendisliği Ana Bilim Dalı
- Bilim Dalı: Belirtilmemiş.
- Sayfa Sayısı: 81
Özet
The M2M communication is a rapidly developing large scale networking device which exchanges information and services without human intervention. M2M communication plays a significant role in many applications includes healthcare, smart house, telemetry and intelligent transportation system, etc. creating billions of devices connected to each other virtually and physically through the Internet. In addition, M2M communication supports the development of smart applications that will enhance the demand of people on how to live, work, and exchange information. Due to the low cost, deployment nature, unguarded, huge number of devices and lack of secure standardization, M2M communication network has several security challenges. These security challenges include Sybil attack, DDoS, falsification attack, etc. Therefore, the intruders try to compromise the credential of network using malware programs and prevent devices from getting services. In order to secure M2M communication network, these security challenges need to be fully addressed to provide confidentiality, availability, integrity and service authentication. In this thesis, we present the analysis of network security problem for M2M communication using OMNET++ simulator and INET simulation model. The analysis is carried out in terms of end-to-end delay, network throughput, sinkhole attack, energy consumption and quality of services (QoS). This thesis also discusses M2M communication technologies, network security problem, and common existing security solution for M2M communication. In addition, we performed the analysis comparison between the normal network topology and network topology that under attacks. The simulation result shows that when M2M communication network no countermeasure is taken into account, the network can be easily compromised and degrade in its performance.
Özet (Çeviri)
The M2M communication is a rapidly developing large scale networking device which exchanges information and services without human intervention. M2M communication plays a significant role in many applications includes healthcare, smart house, telemetry and intelligent transportation system, etc. creating billions of devices connected to each other virtually and physically through the Internet. In addition, M2M communication supports the development of smart applications that will enhance the demand of people on how to live, work, and exchange information. Due to the low cost, deployment nature, unguarded, huge number of devices and lack of secure standardization, M2M communication network has several security challenges. These security challenges include Sybil attack, DDoS, falsification attack, etc. Therefore, the intruders try to compromise the credential of network using malware programs and prevent devices from getting services. In order to secure M2M communication network, these security challenges need to be fully addressed to provide confidentiality, availability, integrity and service authentication. In this thesis, we present the analysis of network security problem for M2M communication using OMNET++ simulator and INET simulation model. The analysis is carried out in terms of end-to-end delay, network throughput, sinkhole attack, energy consumption and quality of services (QoS). This thesis also discusses M2M communication technologies, network security problem, and common existing security solution for M2M communication. In addition, we performed the analysis comparison between the normal network topology and network topology that under attacks. The simulation result shows that when M2M communication network no countermeasure is taken into account, the network can be easily compromised and degrade in its performance.
Benzer Tezler
- Ağ davranış modeli ile kurum içi saldırıların belirlenmesi
Detection of insider attacks using network behavour model
AYŞE GÜL
Yüksek Lisans
Türkçe
2018
Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrolİstanbul Teknik ÜniversitesiBilişim Uygulamaları Ana Bilim Dalı
PROF. DR. ERTUĞRUL KARAÇUHA
PROF. DR. EŞREF ADALI
- Investigating deep reinforcement learningfor static optimization in optical networks
Başlık çevirisi yok
EMRE FURKAN MERCAN
Yüksek Lisans
İngilizce
2020
Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve KontrolPolitecnico di MilanoPROF. MASSİMO TORNATORE
PROF. FRANCESCO MUSUMECİ
- Dynamic security enhancement of power systems via population based optimization methods integrated with artificial neural networks
Yapay sinir ağlarının entegre edildiği popülasyon tabanlı optimizasyon yöntemleriyle güç sistemlerinin dinamik güvenliğinin iyileştirilmesi
CAVİT FATİH KÜÇÜKTEZCAN
Doktora
İngilizce
2015
Elektrik ve Elektronik Mühendisliğiİstanbul Teknik ÜniversitesiElektrik Mühendisliği Ana Bilim Dalı
DOÇ. VEYSEL MURAT İSTEMİHAN GENÇ
- Aircraft detection from large scale remote sensing images with deep learning techniques
Büyük ölçekli uzaktan algılama görüntülerinden derin öğrenme teknikleriyle uçak tespiti
MEHMET SOYDAŞ
Yüksek Lisans
İngilizce
2019
Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrolİstanbul Teknik Üniversitesiİletişim Sistemleri Ana Bilim Dalı
PROF. DR. ELİF SERTEL
- A friendly physical layer warden system
Dost bir fiziksel katman bekçi sistemi
MİRAÇ KUMRAL
Yüksek Lisans
İngilizce
2022
Elektrik ve Elektronik Mühendisliğiİstanbul Teknik ÜniversitesiElektronik ve Haberleşme Mühendisliği Ana Bilim Dalı
PROF. DR. GÜNEŞ ZEYNEP KARABULUT KURT