Essays about: "Trådlös säkerhet"

Showing result 1 - 5 of 14 essays containing the words Trådlös säkerhet.

  1. 1. Analysis of The Co-existence of Local and Macro Mobile Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Outba Bn Nafi Hassan Mohammed Ibrahim; [2023]
    Keywords : ;

    Abstract : The transition to 5G technology holds the promise of significant enhancements to existing wireless connectivity. Industries are increasingly inclined to exploit 5G capabilities, utilizing the technology to bolster mobile broadband and ensure ultra-reliable, low-latency communication services within localized 5G networks. READ MORE

  2. 2. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 3. User Application Development For CANLoRa

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Linnéa Olsson; Markus Rydeberg; [2021]
    Keywords : ;

    Abstract : Wireless communication is becoming more common today. In all industries, there is a great interest in shifting from wired communication to wireless communication. Thus, technologies that enable wireless data transmission are becoming more suitable in the industry. READ MORE

  4. 4. Enhanced DTLS Support for the Contiki-NG OS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rudolfs Arvids Kalnins; Kristaps Karlis Kalnins; [2021]
    Keywords : Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operating Systems; Security; Internet of Things; Contiki-NG; DTLS; MbedTLS; Porting; Operativsystem; Säkerhet;

    Abstract : Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using low-power protocols. READ MORE

  5. 5. Millimeter-Wave Radar data processing

    University essay from Lunds universitet/Avdelningen för Biomedicinsk teknik

    Author : Jonas Tran; [2020]
    Keywords : millimeter wave; radar; pulsed coherent radar; Technology and Engineering;

    Abstract : Based on the feasibility study [4], the goal of this master thesis is to compile custom firmware for the XM112 Pulsed Coherent Radar Module, which features a state of the art radar sensor integrated with a microcontroller unit (MCU). This allows the use of custom firmware to check the plausibility of real-time data processing on the radar signals and will lay some of the groundwork for further development of detection algorithms. READ MORE