Advanced search

Showing result 1 - 5 of 13 essays matching the above criteria.

  1. 1. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE

  2. 2. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE

  3. 3. Improving Security In Embedded Systems With IEEE 802.1X

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Marcus Karlsson; Oscar Zaja; [2021]
    Keywords : EAP; IEEE802.1X; PEAP; TTLS; MSCHAPv2; GTC; TLS; MD5;

    Abstract : .... READ MORE

  4. 4. Evaluation of Key Management Protocols and Their Implementations

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Erik Andersson; David Combler; [2018]
    Keywords : Key Management Protcol; Key Management; Evaluation; Comparison; IKEv2; HIPv2; PANA; 802.1X; Implementation; strongSwan; OpenHIP; openPANA; Open1X;

    Abstract : When constructing a network system it is important to consider the attributes which define said system and how to best build around those attributes. In this report we’ve studied Key Management Protocols as well as 802.15.4 WPAN networks and how key managment is conducted in such networks. READ MORE

  5. 5. Evaluation of EAP Authentication Methods in Wired and Wireless Networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Tirumala Rao Kothaluru; Mohamed Youshah Shameel Mecca; [2012]
    Keywords : Authentication; EAP Methods; IEEE 802.1x; RADIUS;

    Abstract : In any networking environment, security, connection time and scalability of the network are the major concerns to keep network safe, faster and stable. Administrators working within the networking environment need to have complete account of manageability, scalability and security of the network, so that the organizational data can be kept confidential and maintain integrity. READ MORE