Essays about: "Communication protocol"

Showing result 1 - 5 of 431 essays containing the words Communication protocol.

  1. 1. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  2. 2. Internet of Things mesh network : Using the Thread networking protocol

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Anton Alm; [2019]
    Keywords : iot; internet of things; thread; mesh network;

    Abstract : This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. READ MORE

  3. 3. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE

  4. 4. A feasibility study on pairinga smartwatch and a mobile devicethrough multi-modal gestures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dario Bernardi; [2019]
    Keywords : Mobile devices; Security; Pairing; Signal; Processing; Multimodal Gestures;

    Abstract : Pairing is the process of establishing an association between two personal devices. Although such a process is intuitively very simple, achieving a straightforward and secure association is challenging due to several possible attacks and usability-related issues. READ MORE

  5. 5. Performance Evaluation of Multicast Behavior in Congested Networks

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Urmila Jyothula; [2019]
    Keywords : ;

    Abstract : Compuverde’s software-defined storage product uses multicast for the communication between servers in a cluster. The product makes use of IP UDP multicast for sending status messages between the servers that forms the storage cluster. The storage clusters capacity and performance scales linear to the number of servers in the cluster. READ MORE