Essays about: "Eavesdrop"

Showing result 1 - 5 of 10 essays containing the word Eavesdrop.

  1. 1. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ajdin Buljubasic; [2023]
    Keywords : Bachelor Thesis; Drones; Communication; Security; Högskoleingenjör examensarbete; Drönare; Kommunikation; Säkerhet;

    Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE

  2. 2. Decode and Forward Relay Assisting Active Jamming in NOMA System

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lakshmikanth Akurathi; Surya Teja Reddy Chilluguri; [2022]
    Keywords : Physical Layer Security; Power-domain NOMA; Decode and Forward Relay; Jamming in NOMA; Nakagami-m Fading; Relay Transmission; Secrecy Performance.;

    Abstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE

  3. 3. Enhanced DTLS Support for the Contiki-NG OS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rudolfs Arvids Kalnins; Kristaps Karlis Kalnins; [2021]
    Keywords : Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operating Systems; Security; Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operativsystem; Säkerhet;

    Abstract : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. READ MORE

  4. 4. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  5. 5. Capturing children's perspectives about decision-making in the Swedish preschool setting. : How children's rights can be understood by exploring children's voices.

    University essay from Linköpings universitet/Institutionen för tema

    Author : Evdokia Hristia; [2020]
    Keywords : decision-making; preschool; children s rights; Sweden; children’s voices;

    Abstract : This thesis aims to examine children's perceptions of decision-making at the Swedish preschool context by exploring children's voices. This qualitative work is motivated by the United Nations Rights of the Child that became law on the 1st of January 2020 in Sweden. READ MORE