Essays about: "Hardware access"

Showing result 21 - 25 of 237 essays containing the words Hardware access.

  1. 21. Development of a reliable and time-efficient digital production process of encrypted intelligent keys : Embedded systems and software development

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Fredrik Almario Strömblad; Primus Svensson; [2022]
    Keywords : Embedded; software; hardware; automation; automated; gui; accelerate; reliable; time-efficient; efficient; keys; locks; electronic; circuit; production process;

    Abstract : Smart keys are increasing in popularity due to the many benefits they bring. Access control and overview have never been more efficient than it is today. This thesis project automates the digital production of a new line of keys. Automating this production process improves the production in scalability, reliability, and efficiency. READ MORE

  2. 22. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 23. Investigating and Modeling Uplink Processing in 5G NR Multisector Scheduler Simulator

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Oskar Nygren; Axel Sneitz-Björkman; [2022]
    Keywords : Technology and Engineering;

    Abstract : As the latest generation of wireless access technology called Fifth Generation (5G) New Radio (NR) evolves, computational efficiency is key to keep low cost and flexible deployments for vendors. Understanding how the Digital Signal Processing (DSP) load behaves in the digital units is one aspect to enable this efficiency. READ MORE

  4. 24. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE

  5. 25. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE