Proxy-based solution for legacy IoT security and privacy

Numerous legacy IoT devices are vulnerable to even trivial attacks that can easily compromise the entire system, and as such, securing legacy device traffic becomes a necessity when redesigning the device itself is not feasible. After implementing a layer 2 tunnel over TLS for legacy device traffic,...

Full description

Bibliographic Details
Main Author: Rodrigo Monteiro da Cunha Costa Caldas (author)
Format: masterThesis
Language:eng
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10216/135000
Country:Portugal
Oai:oai:repositorio-aberto.up.pt:10216/135000