Advanced search

Showing result 1 - 5 of 22 essays matching the above criteria.

  1. 1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 2. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Huang; [2022]
    Keywords : Ciphertext-Policy Attribute-based encryption; Dynamic Attributes; Network Security; Vehicular Ad Hoc Networks; Ciphertext-Policy Attributbaserad kryptering; dynamiska attribut; nätverkssäkerhet; fordonsbaserade ad hoc-nätverk;

    Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE

  3. 3. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; [2021]
    Keywords : Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE

  4. 4. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weaam Bayaa; [2021]
    Keywords : MDS; GMMHMM; PMP; Machine Learning; Bayesian information Criterion BIC ; Platoon Behavior Recognition; MDS; GMMHMM; PMP; Maskininlärnings; BIC; Plutonbeteendeigenkänning;

    Abstract : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). READ MORE

  5. 5. On the security of TLS and IPsec : Mitigation through physical constraints

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Erik Reimers; [2015]
    Keywords : TLS; Transport Layer Security; IPsec; vulnerabilities; attacks;

    Abstract : TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. READ MORE