ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Creating a CoAP Dataset of Normal and Attacked Traffic

(2023)

Files

Clide-Stell-FEUTIO-WOUTSOP_9945-21-00_2023.pdf
  • Open access
  • Adobe PDF
  • 2.21 MB

Details

Supervisors
Faculty
Degree label
Abstract
The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and efficiency. Central to this revolution is the CoAP protocol, designed to cater to the unique demands of IoT networks. This research undertook an in-depth analysis of the CoAP protocol, pinpointing its operational strengths while concurrently uncovering potential vulnerabilities. Through comprehensive simulations of both benign and malicious traffic, distinct behavioral patterns were identified, underscoring the urgent need for a nuanced balance between the efficiency of lightweight protocols and robust security measures. While the study unveils critical insights, it acknowledges certain limitations and recommends avenues for further exploration. The overarching vision is to fortify the burgeoning IoT landscape, ensuring that the manifold conveniences these devices bring to our daily lives do not inadvertently jeopardize safety and security.