Essays about: "message authentication"

Showing result 1 - 5 of 29 essays containing the words message authentication.

  1. 1. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  2. 2. Distributed Relay/Replay Attacks on GNSS Signals

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malte Lenhart; [2022]
    Keywords : Global Navigation Satellite System GNSS ; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Security; Satellitnavigeringssystem; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Säkerhet;

    Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE

  3. 3. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  4. 4. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiahao Wang; [2022]
    Keywords : Wi-Fi Aware; Secure Service Discovery; Bloom Filter; TESLA; Client Puzzle; Wi-Fi Aware; Säker Serviceupptäckt; Bloom Filter; TESLA; Klient Pussel;

    Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE

  5. 5. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE