Essays about: "edge security"

Showing result 1 - 5 of 44 essays containing the words edge security.

  1. 1. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  2. 2. An evaluation of edge deployment models for Kubernetes

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Robin Sörensen; [2023]
    Keywords : ;

    Abstract : With organisations moving away from in-house servers but still requiring love latency, high security and stability, edge nodes make their appearance as the best alternative. However, it is unclear which deploymen tmethod to use on those systems. This study explored the benefits and disadvantages of the multi-cluster and remote worker approach. READ MORE

  3. 3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  4. 4. Efficient Memory Encryption for Neural Network Accelerators

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : George-Alexandru Stoian; [2023]
    Keywords : ;

    Abstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE

  5. 5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE