Proxy-based solution for legacy IoT security and privacy

Numerous legacy IoT devices are vulnerable to even trivial attacks that can easily compromise the entire system, and as such, securing legacy device traffic becomes a necessity when redesigning the device itself is not feasible. After implementing a layer 2 tunnel over TLS for legacy device traffic,...

ver descrição completa

Detalhes bibliográficos
Autor principal: Rodrigo Monteiro da Cunha Costa Caldas (author)
Formato: masterThesis
Idioma:eng
Publicado em: 2021
Assuntos:
Texto completo:https://hdl.handle.net/10216/135000
País:Portugal
Oai:oai:repositorio-aberto.up.pt:10216/135000