Análisis de la gestión de seguridad y fallos en internet de las cosas, usando el estándar 6lowpan
In the present work, the guidelines were proposed for the implementation of an adequate system of management of security and failures in applications related to the Internet of the Things based on the standard 6LoWPAN. The work is composed of Abstract in Spanish and English, Introduction, Developmen...
Gorde:
| Egile nagusia: | |
|---|---|
| Formatua: | bachelorThesis |
| Hizkuntza: | spa |
| Argitaratua: |
2016
|
| Gaiak: | |
| Sarrera elektronikoa: | http://dspace.udla.edu.ec/handle/33000/6952 |
| Etiketak: |
Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|
| Gaia: | In the present work, the guidelines were proposed for the implementation of an adequate system of management of security and failures in applications related to the Internet of the Things based on the standard 6LoWPAN. The work is composed of Abstract in Spanish and English, Introduction, Development, Conclusions and Bibliography. The development of the work is formed by three chapters. In Chapter I, the main concepts related to the Internet of Things were defined, the emergence and evolution of these new functionalities of the network, the main applications being implemented, the level of penetration of these technologies in society of today, and as will be the trend for the next years. The features of the 6LoWPAN standard are presented and a comparison was made between the standards developed for wireless applications of low power personal area networks. Chapter II presented the main faults that usually occur in computer systems and assessed the impact they may have on applications related to the Internet of Things. The main vulnerabilities associated with the interconnection with the network were identified as well as ways of mitigating them. Chapter III is the most important of the research, in which he explained the criteria that should be followed when implementing security management systems and faults in Internet applications of the Things so that they are effective and explained the consequences of the non-existence of these security systems and failures. |
|---|