Browse wiki

Jump to: navigation, search
Evaluation and Improvement of technologies for CCTV
Approved Pending  +
DueDate 2 May 2015  +
Keywords Embedded systems  + , Security  +
Methods The tools and methods in this thesis are bThe tools and methods in this thesis are based on * A set of scenario, describing the challenges * A list of requirements being extracted from the scenarios * A description and evaluation of technologies and tools being candidates for solutions * A functional architecture/description of the envisaged system * An implementation of the core concepts * A demonstration of the solution * An evaluation of the solution, including a critical review of the descisions taken earlier * Conclusions * Referencess taken earlier * Conclusions * References  +
Objective Many industrial sensor networks use real-tMany industrial sensor networks use real-time data transmission over public networks (GPRS, the Internet, satellites) or private radio links or cables. These links are in principle possible to listen in to or monitor. With increasing awareness of security risks for information theft or distortion in sensor systems it is suspected that customers buying sensor network services will in the near future demand security as well as reliability. Embedded systems often have limitations regarding data processing and internal memory. In addition there are typically limitations in data rates of the transmission medium. The thesis will investigate what demands to security exists (if any) from governmental organs (Norwegian, European, globally) and what typical demands central actors in Norwegian industries demand. Coming trends for the future will also be evaluated. In addition the thesis will evaluate different possibilities for implementing security on already existing embedded sensor systems. This thesis will in the end be able to answer what might be necessary functionality to secure data information for data loggers that deliver sensor data to customers using open communication channels.stomers using open communication channels.  +
Pre-Knowledge This thesis includes a reasonable amount of programming. The envisaged thesis is based on security and radio communications, thus expects the user to have followed at least two radio-or security-related courses  +
Schedule The envisaged time schedule (for a long thThe envisaged time schedule (for a long thesis/60 ECTS) is: :T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shall be finalized :T0+2 months: create an initial page describing the scenario :T0+5: Provide a list of technologies which you think are necessary for the thesis :T0+5: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section :T0+8: Provide a draft of section 2 (scenario) and 3 (technologies) :T0+10: Establish a draft on what to implement/architecture :T0+11: Set-up an implementation, testing and evaluation plan :T0+15: Evaluate your solution based on a set of parameters, keep in mind <i>there is no such thing as a free lunch</i> :T0+17: Deliver the thesislunch</i> :T0+17: Deliver the thesis  +
Supervisor Knut Øvsthus  +
ThesisStatus Planned  +
Titel Evaluation and Improvement of Security in Embedded Sensor Systems  +
User N.n.  +
Creation dateThis property is a special property in this wiki. 23 April 2013 14:53:54  +
Categories Thesis  +
Modification dateThis property is a special property in this wiki. 11 June 2014 08:37:17  +
hide properties that link here 
  No properties link to this page.
 

 

Enter the name of the page to start browsing from.