Essays about: "thesis on network security"

Showing result 1 - 5 of 233 essays containing the words thesis on network security.

  1. 1. Assessing blockchain technology for Transport Data Logger

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Björn Johansson; [2018]
    Keywords : blockchain; transport data logger; hyperledger; hyperledger fabric; byzantine fault tolerance; bft; supply chain; transport chain; permissioned; permissionless; documental truth; historical truth; immutability; security; log data; Technology and Engineering;

    Abstract : A proof of concept permissioned blockchain system that holds data from the Transport Data Logger, TDL, was developed. Transport chain actors who hand off TDL-equipped goods between one another use the TDL app to upload a digital handoff containing their identities and log data from and signed by the TDL to a Hyperledger Fabric blockchain network. READ MORE

  2. 2. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Andreas Messing; [2018]
    Keywords : vehicular communication; network; security; privacy;

    Abstract : Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. READ MORE

  3. 3. PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION

    University essay from

    Author : Srihari Arolla; Naga Venkata Sai Teja Gurrala; [2018]
    Keywords : Physical Layer Security; Bit Error Rate; Key Error Rate; Pseudo Random Generator; Secret Key.;

    Abstract : Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. READ MORE

  4. 4. Intra-Vehicle Connectivity : Case study and channel characterization

    University essay from Uppsala universitet/Signaler och System

    Author : Albin Sellergren; [2018]
    Keywords : Wireless Sensor Networks; Intra-Vehicle Connectivity; Bluetooth Low-Energy; Ultra Wide-Band; 60 GHz Millimeter Wave; Vehicular Network Architecture;

    Abstract : The purpose of this thesis was to investigate the feasibility of a wireless architectural approach for intra-vehicle communications. The current wired architecture was compared to a wireless approach based on three prominent wireless protocols, namely Bluetooth Low-Energy, Ultra Wide-Band, and 60 GHz Millimeter wave technology. READ MORE

  5. 5. On Statistical Properties of Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2018]
    Keywords : PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.;

    Abstract : The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. READ MORE