Semantic search

Jump to: navigation, search

[Edit query]| Show embed code


Previous     Results 26 – 40    Next        (20 | 50 | 100 | 250 | 500)
Open Master Thesis related to SCOTT
  • Measurable security and privacy (Supervisor(s): Josef Noll, Toktam Ramezanifarkhani,
    Objective:
    The objective is to develop metrics for measuring security and privacy of systems in general and in a specific domain of interest.)
  • Privacy Labelling, Security Metrics and Roadmap
  • 5G Network Slicing for Free Access to Information (Supervisor(s): Josef Noll,
    Objective:
    In Mobile Communications, 5G Research is focussing on (a) massive mobile broadband, (b) billions of sensors connected to the network, and (c) ultra-reliable and low-latency networks. A promising technology for addressing these issues is network slicing. This thesis will look into network slicing for free access to information, and thus address the challenges of sustainable development. The free access to information (InfoInternet) is answering the needs of digital inclusion, and addresses the needs of 4 billion people currently not using the Internet. InfoInternet means free access to information for all, and addresses directly the SDG goal 9.c of the Agenda 2030. InfoInternet is further the basis ans the catalyst for SDG 3 (health), 4 (education), 5 (gender equality), 8 (decent work), 10 (reduced inequalities), 11 (sustainable cities and communities) and 17 (partnership for the goals). The envisaged Thesis will elaborate on the network slicing for InfoInternet, and evaluates the technological and societal aspects. see also: Thanh van Do, Josef Noll, Sudhir Dixit, Bruno Dzogovic, Van Thuan Do, Boning Feng, "Reducing Inequalities with 5G Internet Light Network Slice", 5G World Summit, IEEE 5G World Forum, 9-11July2018, Santa Clara, California, USA)
  • Privacy violation through improper handling of electronic waste (Supervisor(s): Josef Noll, Christian Johansen, Adam Szekeres,
    Objective:
    Distribution system operators (DSO) represent the link between the electric grid and end-users, as they are responsible for delivering electricity to residential homes, industrial consumers, etc. As the grid quickly evolves into a Smart Grid by the addition of a variety of IoT devices like Smart Meters, more and more personal sensitive information is being collected, transmitted and stored. When devices are replaced, sensitive information might still be present that could end up in the hands of persons trying to take advantage of it causing privacy threats. The thesis would focus on electronic waste handling practices (current and planned) by identifying # devices storing sensitive information (including but not limited to the Advanced Metering Infrastructure – AMI), # the attributes of the information stored, # regulations regarding the data life-cycle. # etc. Questions that the thesis might answer: # Is it a reasonable worry that information might be leaked from discarded devices? (Risk owner – Customer) # What are the existing e-waste handling practices? # Are there DSO`s (among the 100+ in Norway) whose customers might face the risk of their information being leaked after storage devices are discarded? (Risk owner – Customer) # Might DSO’s face penalties for negligent handling of discarded devices? (Risk owner – DSO))
  • Novel Services through Consumption Monitoring (Supervisor(s): Josef Noll, György Kálmán,
    Objective:
    Future Homes will have one or several gateways to information on the Internet. Norway will introduce Smart Meters by 2019, giving the opportunity to develop new services on top of this infrastructure. Current regulations suggest a reading of power values 1/hour, or in maximum every 15 min. Given a high-frequency reading of power consumption (1/10s, 1/min) might give an opportunity to introduce new services. One of such services is the virtual fall sensor, establishing a probability of an abnormal situation with the readings from e.g. power consumption. Such an analysis, comparing the habits/profile of the user with the actual consumption, is suggested to be performed in the home of the user, and thus preserve privacy. The envisaged assessment of novel services will be based on high-frequency consumption data from actual smart meters, or even from fuse level, as well as modelling of services.)
  • Multi Metrics Based Framework (Supervisor(s): Josef Noll, Seraj Fayyad,
    Objective:
    The final Thesis document Embedded System (ES) becomes increasingly popular in modern times. This popularity increases the importance of the security for these systems. The reliable evaluation of the ES`s security is considered as a crucial requirement for the enhancement of its security. The evaluation of the security level for a given ES has various challenges, such as the heterogeneity among system`s components. One of the promising approaches, which considered these challenges is Multi Metrics (MM) approach. In his/her thesis, the student will investigated the applicability of MM approach on real ES use case, such as smart meter system. In his investigation, the student will identify the security level of the system and will identify the possible changes which could impact the security level of the system.)
  • Assessment of Measurable Privacy for IoT Consumer Products (Supervisor(s): Josef Noll, Elahe Fazeldehkordi,
    Objective:
    The Consumer Services of Norway (Forbrukerrådet) have established a report on privacy in Apps "App-Fail". In there they have found breach of privacy by apps. They identified a lack of "understandable privacy" as the main challenge. This thesis will * analysis of privacy of home IoT devices * starting from "privacy by design", and identifying input parameters for "privacy" * Adopt the multi-metrics methodology for converting input parameters of privacy into measurable privacy * suggestion for privacy classes, following the European energy labelling * provide at least two usage scenarios of devices/applications, e.g. sporting device ("speedometer") or child doll * criteria and evaluation of privacy labels)
  • Smart Meter Security Analysis (Supervisor(s): György Kálmán, Josef Noll,
    Objective:
    Within 1Jan2019 all electricity customers in Norway will have to use smart metters. These smart meters (SM) will become part of the ”Avanserte Måle- og Styringssystemer” (Automatic Meter Systems - AMS), and include that users can have a better information on their electricity usage, a more accurate billing of their consumption and the opportunity for automatic controlling of the power consumption. Pilots have already been running at several places in Norway. Academia, Grid distributors, Industry, and Consumer Organisations have joined through the IoTSec.no initiative to discuss security and privacy related to the services and infrastructures in an AMS. This thesis will focus on security and privacy of the meters themselves. The thesis will compare smart meters with other infrastructures like payment terminals, and provide a classification of security of the components of the smart meter.)
  • Building an Attack Simulator on the Electric Grid Infrastructure (Supervisor(s): György Kálmán, Josef Noll,
    Objective:
    The future electricity network is based on components, which are state-of-the-art from some years back in time. As an example, the SCADA system consists of network interfaces, browser sessions..., which all can be hacked using standard vulnerabilities. The goal of this thesis is to analyse the vulnerabilities, and build a mobile demonstrator.)
  • Security challenges of open low-capacity wifi access (Supervisor(s): Josef Noll, György Kálmán,
    Objective:
    We have seen a variety of cities providing free wifi for their inhabitants. However, when providing the full Internet without authentication, you run the risk of criminal activities to happen using that free Wifi. When you run authentication, it makes access cumbersome. Thus, the idea is to provide free low-capacity Internet without authentication, which would allow you to only consume information (no file download, no gaming, no streaming/video). With the knowledge of risk assessment, the candidate should be able to evaluate the security of such an open access.)
  • The human aspect in Smart grids (from Security and Privacy point of view) (Supervisor(s): Josef Noll, Christian Johansen,
    Objective:
    In this thesis, we are interested in the human aspect in security and privacy concerns in Internet of Things for smart grids. More precise, we will use case studies to find out exactly how humans can influence the security of the smart grid, and how humans perceive the privacy aspects.)
  • Semantic Modeling of a Smart Home Infrastructure (Supervisor(s): Josef Noll, Christian Johansen,
    Objective:
    Future Homes will have one or several gateways to information on the Internet. Norway will introduce Smart Meters by 2019, giving the opportunity to develop new services on top of this infrastructure. The envisaged modeling of the Smart Home Infrastructure will be based on the planned infrastructure for Smart Meters, and extended towards future capabilities. Main focus is on security and privacy for the user. The thesis is related to the http://IoTSec.no project.)
  • Risk Assessment tool analysis for Industrial Automation and Control Systems (Supervisor(s): Mohammad Mushfiqur Rahman Chowdhury, Judith Rossebø, Josef Noll,
    Objective:
    The thesis focuses on the evaluation of tools and methodologies in the area of risk assessment with the aim to evaluate whether the tools/standards/methodologies are suitable for use in the areas of IACS. The thesis will also reach some conclusions on the applicability of selected suitable methodology based on evaluation criteria (if there are suitable ones that exist). If no suitable evaluation criteria exist, thesis will propose such criteria. Additionally, the student is expected to propose modifications to an existing methodology so that it is even more suitable for IACS. The student will first conduct a state of the art investigation to get an overview over relevant risk assessment methodologies and tools. Based on a set of evaluation criteria, one or more methodologies and tools will be selected for further evaluation and analysis. The state of the art investigation should include methodologies and best practices developed by the research/academic community, relevant International standards focusing IACS (e.g. ISA99/IEC 62443) as well as generic information security risk assessment or management standards (e.g. ISO 27000 series).In addition to International standards, the thesis will evaluate relevant information security guidelines and best practices proposed by organizations such as NIST, CERTs, ENISA etc. Regional standards such as Norwegian Oil and Gas guidelines (old OLF) should also be studied. While evaluating risk assessment methodologies, the student may propose extensions or modifications to a selected suitable methodology in order to improve the methodology so that it is even more suitable for IACS. The thesis will identify the most relevant risk assessment tools and will investigate thoroughly the available open source tools. Some of these tools may contain software components to assess risks. While performing the detailed evaluation works, this work will shed lights on how to use these tools and conduct a strength and weakness analysis. The outcome of the thesis will be a detailed review of standards and tools from risk assessment point of view in the areas of Industrial Automation and Control Systems, and the evaluation of 1-2 specific packages.)
  • Prosumers for the future smart electricity grid (Supervisor(s): Josef Noll,
    Objective:
    The electric grid is undergoing changes. Natural resoures like sun and wind contribute to the production of energy. While most of these effects are driven by industrial actors, we'll see the following trends: * Prosumers, where consumers will also contribute to energy * An energy market which is open for private users * users will have the chance to monitor and adopt their energy usage Special aspects being addressed in this thesis are * the role and potential of becoming a prosumer * privacy aspects * analysis of consumption and production of energy (as review) * "norske forhold")
  • Measurable Security for Sensor Communication in the Internet of Things (Supervisor(s): Josef Noll, Mohammad Mushfiqur Rahman Chowdhury,
    Objective:
    Internet of Things (IoT) will mean for industrial systems * more sensors * more data * how to ensure that "information" spread from one system to another is secure enough * how to measure the level of security needed to have from a sensor? This thesis will address measurable security as the means for defining the security of an industrial system. Previous work has established the Multi-Metrics method, which will be applied to an industrial system following the security specifications from UNIK4750 for secure industrial systems (see L9 from 2016).)
Previous     Results 26 – 40    Next        (20 | 50 | 100 | 250 | 500)