Essays about: "end-to-end-säkerhet"

Found 3 essays containing the word end-to-end-säkerhet.

  1. 1. Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Miora Ralambotiana; [2018]
    Keywords : IoT; LoRaWAN; key management; E2E security; IoT; LoRaWAN; nyckelhantering; end-to-end-säkerhet;

    Abstract : Nowadays, Internet of Things (IoT) applications are gaining more importance in people’s everyday life. Depending of their usage (for long or short distance communications, using low or high power devices, etc.), several standards exist. READ MORE

  2. 2. M2M and Mobile Communications : an Implementation in the Solar Energy Industry

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Antonio Gonzalez Robles; [2015]
    Keywords : M2M; CoAP; DTLS; Raspberry Pi; UDP; Wireless; Smart meter;

    Abstract : Machine-to-Machine (M2M) communications are used for several purposes, forinstance to transmit information derived from measurements collected frommonitoring instruments. M2M communications also allow intelligent devices toexchange real-time data without human intervention. READ MORE

  3. 3. SIP on an Overlay Network

    University essay from KTH/Kommunikationssystem, CoS

    Author : Xiao Wu; [2009]
    Keywords : VOIPSec; NAT; IPSec; SIP; SRTP; VPN;

    Abstract : With the development of mobile (specifically: wide area cellular telephony) technology, users’ requirements have changed from the basic voice service based on circuit switch technology to a desire for high speed packet based data transmission services. Voice over IP (VoIP), a packet based service, is gaining increasing attention due to its high performance and low cost. READ MORE