Essays about: "layer 2 security"

Showing result 6 - 10 of 17 essays containing the words layer 2 security.

  1. 6. Efficient Security Protocol for RESTful IoT devices

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Karnarjun Kantharajan; Sahar Shirafkan; [2020]
    Keywords : Internet of Things IoT ; TLS 1.2 1.3; DTLS 1.2; OSCORE; CoAP; Security Protocols.; Technology and Engineering;

    Abstract : In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1. READ MORE

  2. 7. Channel-Based Intrusion Detection at the LTE Physical Layer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bjarki Mar Benediktsson; [2019]
    Keywords : ;

    Abstract : Long Term Evolution (LTE) is the most widespread cellular technology around the globe. An LTE device must communicate with base stations without encryption and authentication before a connection to a network is established and security steps executed. READ MORE

  3. 8. Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Khalid Elbashir; [2017]
    Keywords : Open vSwitch; SDN; Trusted Execution Environment; SGX; Cloud Computing; Open vSwitch; SDN; mjukvarudefinierade nätverk; SGX; molntjänster;

    Abstract : The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. READ MORE

  4. 9. Post-quantum Secure Communication on a Low Performance IoT Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Thomas Strahl; Rickard Johansson; [2016]
    Keywords : Post-quantum; TLS; SSL; RLWE; Quantum computer; key exchange; Technology and Engineering;

    Abstract : A recent trend in the IT world is the term Internet of Things (IoT). As more and more devices get connected to the internet, and with companies trying to lower production costs in order to stay competitive, security can easily be neglected. READ MORE

  5. 10. DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Ali Mustafa; Nasir Siddique; Mubeen Zubair; [2015]
    Keywords : data link layer;

    Abstract : The Open Systems Interconnect Model (OSI) is a conceptual model of networking thatcategorizes network functions into seven layers. It is defined in this model that how layerscommunicate with each other. In this thesis, we address common Layer 2 attacks and theirsolutions. Layer 2 is considered a very weak link in a secure network. READ MORE