Essays about: "Ad hoc network security"
Showing result 1 - 5 of 22 essays containing the words Ad hoc network security.
-
1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE
-
2. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE
-
3. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE
-
4. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). READ MORE
-
5. On the security of TLS and IPsec : Mitigation through physical constraints
University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakultetenAbstract : TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. READ MORE