Advanced search

Showing result 11 - 15 of 78 essays matching the above criteria.

  1. 11. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  2. 12. Puzzle-based Clogging DoS-resilient Vehicular Communications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhichao Zhou; [2022]
    Keywords : On-Board Units OBUs ; Denial of Service DoS ; Puzzle scheme; Hash function; Pre-authenticate; On-Board Units OBUs ; Denial of Service DoS ; Pusselsystemet; Hashfunktioner; Förautentisera;

    Abstract : In Vehicular Communication Systems (VCSs), authenticated safety beacons are used to deliver the vehicles’ status and provide necessary information for the applications. However, high rate safety beacons impose high processing overhead on the resource-constrained vehicular On-Board Units (OBUs). READ MORE

  3. 13. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE

  4. 14. Threats and Privacy Breaches Against Internet of Things- and Smart Home Users

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Alva Karlborg; Adam Wiktorsson; [2022]
    Keywords : Privacy; Security; Threat; Attack; Internet of Things; Smart Home; User; Internet; Integritet; Säkerhet; Hot; Attack; Sakernas internet; Smart hem; Användare; Internet;

    Abstract : With more parts of our lives going digital than ever before, more parts of our lives are also endangered. Not enough research and studies are done on users and their usage of Internet of Things and Smart Homes, which makes them vulnerable to several risks and attacks. READ MORE

  5. 15. Data-driven cyberattack detection for microgrids

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiaying Mao; [2022]
    Keywords : Cyberattack detection; Deep learning network; Microgrid; Smart inverter; Cyber-physical system; Distributed system; Detektering av cyberattacker; Djupinlärning nätverk; Microgrid; Smart växelriktare; Cyberfysiska system; Distribuerade system;

    Abstract : Microgrids are undergoing higher penetrations of renewables and associated power electronics, along with precise and sophisticated control and communication networks. However, such cyber-physical systems might suffer from potential cybersecurity threats and inherent low inertia. READ MORE