Essays about: "thesis on wifi"

Showing result 1 - 5 of 80 essays containing the words thesis on wifi.

  1. 1. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  2. 2. Design and Evaluation of a logging system in a power-constrained environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Morgan Adamsson; [2023]
    Keywords : Low power; logging; embedded systems; power supply; Bluetooth Low Energy; WiFi; flash memory; Låg effekt; loggning; inbyggda system; strömförsörjning; Bluetooth Low Energy; WiFi; flashminne;

    Abstract : Logging plays a crucial role in debugging endeavors, assisting technicians in identifying errors and improving the overall sustainability of electrical systems. This thesis focuses on integrating local logging capabilities into the Balise Transmission Module (BTM), a legacy control system that lacks such features. READ MORE

  3. 3. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Henning; [2023]
    Keywords : Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE

  4. 4. Browser Based Remote Control of Raspberry Pi enabled RC Car

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Theodor Le Brasseur; [2023]
    Keywords : ;

    Abstract : There are a variety of network technologies with different uses. Technologies such as WiFi and Ethernet are often used in for example home networks. Technologies such as Starlink make it possible to access the internet with high bandwidth and low latency globally. READ MORE

  5. 5. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE