Essays about: "Ad hoc network security"

Showing result 1 - 5 of 20 essays containing the words Ad hoc network security.

  1. 1. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; [2021]
    Keywords : Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE

  2. 2. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weaam Bayaa; [2021]
    Keywords : MDS; GMMHMM; PMP; Machine Learning; Bayesian information Criterion BIC ; Platoon Behavior Recognition; MDS; GMMHMM; PMP; Maskininlärnings; BIC; Plutonbeteendeigenkänning;

    Abstract : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). READ MORE

  3. 3. On the security of TLS and IPsec : Mitigation through physical constraints

    University essay from Linköpings universitet/Institutionen för datavetenskapLinköpings universitet/Tekniska fakulteten

    Author : Erik Reimers; [2015]
    Keywords : TLS; Transport Layer Security; IPsec; vulnerabilities; attacks;

    Abstract : TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. READ MORE

  4. 4. Developing a warehouse optimization model for humanitarian logistics : A study with United Nations High Commissioner for Refugees (UNHCR)

    University essay from Lunds universitet/Teknisk logistik

    Author : Henrik Taino Bendz; Karl-Fredrik Granlund; [2013]
    Keywords : Facility localization modelling; warehouse network design; humanitarian supply chain management; UNHCR; Technology and Engineering;

    Abstract : In humanitarian logistics today there is a gap between the practical and theoretical methods used for facility localization. The consequence is that ad-hoc methods are frequently used, leading to non-optimal localization of facilities which in turn leads to long lead times and costs. READ MORE

  5. 5. A secure mobile social network

    University essay from

    Author : Yucheng Wu; [2012]
    Keywords : ;

    Abstract : Mobile social networks are a new trend to improve the quality of our life, so they should not bring any extra burden to users. The users should not anymore be worried how to set up a secure complex password and memorize it to prove their identities. The Generic Bootstrapping Architecture is used in this thesis as a novel way of authentication. READ MORE