Essays about: "layer 2 security"
Showing result 6 - 10 of 17 essays containing the words layer 2 security.
-
6. Efficient Security Protocol for RESTful IoT devices
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1. READ MORE
-
7. Channel-Based Intrusion Detection at the LTE Physical Layer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Long Term Evolution (LTE) is the most widespread cellular technology around the globe. An LTE device must communicate with base stations without encryption and authentication before a connection to a network is established and security steps executed. READ MORE
-
8. Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. READ MORE
-
9. Post-quantum Secure Communication on a Low Performance IoT Platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A recent trend in the IT world is the term Internet of Things (IoT). As more and more devices get connected to the internet, and with companies trying to lower production costs in order to stay competitive, security can easily be neglected. READ MORE
-
10. DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The Open Systems Interconnect Model (OSI) is a conceptual model of networking thatcategorizes network functions into seven layers. It is defined in this model that how layerscommunicate with each other. In this thesis, we address common Layer 2 attacks and theirsolutions. Layer 2 is considered a very weak link in a secure network. READ MORE