Essays about: "MAC protocol"

Showing result 6 - 10 of 66 essays containing the words MAC protocol.

  1. 6. Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Anna Pestrea; [2021]
    Keywords : Fuzzer; fuzz-testing; eNB; LTE; air interface; MAC layer; MAC protocol;

    Abstract : In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. READ MORE

  2. 7. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  3. 8. Energy-Efficient Communication with Lightweight M2M in IoT Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Gonzalo Peces; [2018]
    Keywords : IoT; LwM2M; low power consumption; TSCH; Contiki-NG; Eclipse Leshan.; IoT; LwM2M; låg energiförbrukning; TSCH; Contiki-NG; Eclipse Leshan.;

    Abstract : OMA’s Lightweight Machine to Machine (LwM2M) is an application protocol for device management in the Internet of Things (IoT) that has been recently published and widely adopted in a lot of projects. The protocol is designed to operate in sensor networks and machine-to-machine environments, where one of the main constraints is the energy consumption since the nodes are usually battery powered. READ MORE

  4. 9. Communication Between Mixed Criticality Systems : Study and Implementation of a Communication Protocol Between Vehicles in a Platoon

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Erik Lerander; [2017]
    Keywords : ;

    Abstract : Cars and roads are becoming smarter. New automotive technologies enable cars to take over driver tasks more and more with the ultimate goal to create fully autonomous driving cars. One investigated method is to let the cars drive in a platoon. READ MORE

  5. 10. PERFORMANCE ANALYSIS OF DUTY-CYCLE MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS

    University essay from Högskolan i Gävle/Avdelningen för elektronik, matematik och naturvetenskap

    Author : Alfredo Frances Galiana; [2016]
    Keywords : ;

    Abstract : This thesis studies the behavior of the S-MAC protocol in a Wireless Sensor Networks (WSN). The main limitation of the WSN is the lifetime of the battery, because normally it is short and it is not possible to change it all the time. For this reason, the battery consumption and the delay have to be low. READ MORE