Vis enkel innførsel

dc.contributor.advisorAlcocer, Alex
dc.contributor.authorCyiza, Raymond B.
dc.date.accessioned2022-09-08T10:59:28Z
dc.date.available2022-09-08T10:59:28Z
dc.date.issued2022
dc.identifier.urihttps://hdl.handle.net/11250/3016585
dc.description.abstractIn this thesis we cover underwater ROVs open Wi-Fi access attacks, threats and vulnerabilities using ethical hacking techniques between passive and active information gathering. The information gathered is then compared to the STRIDE model, along with the OWASP 2021 Top 10 list, concluding with an assessment of risk analysis based on the CVSS(Common Vulnerability Scoring System) scores. Chasing Dory and a ROV model with similar topology are used in this project for threat modelling, hydrodynamic and hydrostatic analyses demonstrated with ANSYS, Simulink and Matlab software tools. The PID tuning model used for the ROV model is a simple PID controller based on a continuous time domain transfer function.en_US
dc.language.isoengen_US
dc.publisherOsloMet - storbyuniversiteteten_US
dc.relation.ispartofseriesACIT;2022
dc.subjectEthical hackingen_US
dc.titleMotion control and Wi-Fi threat modelling analysis of small and affordable underwater ROV. (Ethically hacking Chasing Dory and testing/optimizing a simple PID control on a underwater ROV model)en_US
dc.typeMaster thesisen_US
dc.description.versionpublishedVersionen_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel