Essays about: "access layer"

Showing result 11 - 15 of 160 essays containing the words access layer.

  1. 11. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  2. 12. Access Point Selection and Clustering Methods with Minimal Switching for Green Cell-Free Massive MIMO Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qinglong He; [2022]
    Keywords : Cell-free massive MIMO; multi-objective optimization; deep reinforcement learning; AP switch ON OFF; energy efficiency; Cellfri massiv MIMO; multiobjektiv optimering; djup förstärkningsinlärning; AP switch ON OFF; energieffektivitet;

    Abstract : As a novel beyond fifth-generation (5G) concept, cell-free massive MIMO (multiple-input multiple-output) recently has become a promising physical-layer technology where an enormous number of distributed access points (APs), coordinated by a central processing unit (CPU), cooperate to coherently serve a large number of user equipments (UEs) in the same time/frequency resource. However, denser AP deployment in cell-free networks as well as an exponentially growing number of mobile UEs lead to higher power consumption. READ MORE

  3. 13. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  4. 14. Nature-based solutions for cities transitioning towards sustainability: A participatory evaluation through a social and environmental lens

    University essay from Blekinge Tekniska Högskola/Institutionen för strategisk hållbar utveckling

    Author : Thanyaporn (Pear) Wongtitirote; Aviv Leibovitsh; Zouheir (Zack) Assaf; [2022]
    Keywords : Nature based Solutions NbS ; Strategic Sustainable development; sustainability; participatory evaluation; urban; urban planning; cities; biodiversity; Participatory Photo Mapping PPM ;

    Abstract : Global urbanization trends have made people move to cities where they tend to have less access to nature. Urban nature is important for human well-being and biodiversity, therefore urban planners are increasingly integrating Nature-based Solutions (NbS) projects in urban environments. READ MORE

  5. 15. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE