Essays about: "Communication protocol"

Showing result 1 - 5 of 421 essays containing the words Communication protocol.

  1. 1. Internet of Things mesh network : Using the Thread networking protocol

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Anton Alm; [2019]
    Keywords : iot; internet of things; thread; mesh network;

    Abstract : This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. READ MORE

  2. 2. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE

  3. 3. A feasibility study on pairinga smartwatch and a mobile devicethrough multi-modal gestures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dario Bernardi; [2019]
    Keywords : Mobile devices; Security; Pairing; Signal; Processing; Multimodal Gestures;

    Abstract : Pairing is the process of establishing an association between two personal devices. Although such a process is intuitively very simple, achieving a straightforward and secure association is challenging due to several possible attacks and usability-related issues. READ MORE

  4. 4. Performance Evaluation of Multicast Behavior in Congested Networks

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Urmila Jyothula; [2019]
    Keywords : ;

    Abstract : Compuverde’s software-defined storage product uses multicast for the communication between servers in a cluster. The product makes use of IP UDP multicast for sending status messages between the servers that forms the storage cluster. The storage clusters capacity and performance scales linear to the number of servers in the cluster. READ MORE

  5. 5. Anomaly Detection in Industrial Networks using a Resource-Constrained Edge Device

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Anton Eliasson; [2019]
    Keywords : Machine learning; Anomaly detection; Industrial networks; Profinet; Edge computing; Edge;

    Abstract : The detection of false data-injection attacks in industrial networks is a growing challenge in the industry because it requires knowledge of application and protocol specific behaviors. Profinet is a common communication standard currently used in the industry, which has the potential to encounter this type of attack. READ MORE