Národní úložiště šedé literatury Nalezeno 2 záznamů.  Hledání trvalo 0.00 vteřin. 
Secure Provisioning of IoT Devices
Rusiňák, Petr ; Hujňák, Ondřej (oponent) ; Malinka, Kamil (vedoucí práce)
With the increasing number of IoT devices sold each year, many large-scale applications using IoT devices are emerging. This creates a demand for secure and easy-to-use device provisioning protocols, as it is not feasible to spend a tremendous amount of time configuring the devices. The aim of this thesis is to create a secure provisioning protocol that will configure the network credentials on an out-of-the-box IoT device automatically. The implemented protocol uses a dedicated Configurator device that stores the network credentials of all compatible devices from a given administrative domain. The Configurator device will provide the network credentials to unconfigured devices upon request, assuming they are able to authenticate with the Configurator. The protocol uses public-key cryptography to verify the identity of the devices during. This protocol was implemented using ESP32 devices, and the connectionless ESP-NOW protocol is used to communicate with the unconfigured devices.
Secure Provisioning of IoT Devices
Rusiňák, Petr ; Hujňák, Ondřej (oponent) ; Malinka, Kamil (vedoucí práce)
With the increasing number of IoT devices sold each year, many large-scale applications using IoT devices are emerging. This creates a demand for secure and easy-to-use device provisioning protocols, as it is not feasible to spend a tremendous amount of time configuring the devices. The aim of this thesis is to create a secure provisioning protocol that will configure the network credentials on an out-of-the-box IoT device automatically. The implemented protocol uses a dedicated Configurator device that stores the network credentials of all compatible devices from a given administrative domain. The Configurator device will provide the network credentials to unconfigured devices upon request, assuming they are able to authenticate with the Configurator. The protocol uses public-key cryptography to verify the identity of the devices during. This protocol was implemented using ESP32 devices, and the connectionless ESP-NOW protocol is used to communicate with the unconfigured devices.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.