Essays about: "layer 2 security"

Showing result 1 - 5 of 17 essays containing the words layer 2 security.

  1. 1. Selective Kernel Network based Crowding Counting and Crowd Density Estimation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jinchen Liu; [2023]
    Keywords : Crowding Counting; Convolution Neural Network; Selective kernel; Trängselräkning; konvolutionsneuralnätverk; Selektiv kärna;

    Abstract : Managing crowd density has become an immense challenge for public authorities due to population growth and evolving human dynamics. Crowd counting estimates the number of individuals in a given area or scene, making it a practical technique applicable in real-world scenarios such as surveillance and traffic control. READ MORE

  2. 2. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  3. 3. Technologies and Evaluation Metrics for On-Board Over the Air Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Aneysha Datta; [2022]
    Keywords : Wireless; Performance Metrics; WAVE; DMG; Intra-Vehicular Communication; BER; Simulink; Model-Based Design;

    Abstract : This project has been carried out at the Electronic Embedded Systems Architecture Department at Volvo Construction Equipment (VCE), Eskilstuna, Sweden. It forms the baseline for a stepwise systematic research initiative to convert wired technologies used for certain in-vehicle control and communication components to wireless technologies. READ MORE

  4. 4. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE

  5. 5. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE