Essays about: "mobile IP"

Showing result 6 - 10 of 127 essays containing the words mobile IP.

  1. 6. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  2. 7. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  3. 8. Security Auditing and Testing of two Android Client-Server Applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Matilda Engström Ericsson; [2020]
    Keywords : Security audit; Security testing; Android Client-Server; OWASP Top 10 Mobile Risks; Automated tools; MITM attack; SSL; Authorization;

    Abstract : How secure is your application? How can you evaluate if it is secure? The threats are many and may be hard to find. In a world where things are more and more automated; how does manual labour contribute to security auditing applications? This study aims to assess two proof of concept Android client-server applications, developed by students to suit the needs of a fictitious Police Department and Fire Department, respectively. READ MORE

  4. 9. Customized Processor Design for 5G Data Link Layer Processing

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Patric Wargéus; Lukas Forsberg; [2020]
    Keywords : Technology and Engineering;

    Abstract : This thesis aims to explore the workflow related to designing an application specific instruction-set processor (ASIP). An ASIP is a processor similar to a hardware accelerator (HAC) in terms of performance and efficiency, but containing elements of general purpose processors (GPPs) when it comes to programmability and flexibility. READ MORE

  5. 10. Network Service Mesh Solving Cloud Native IMS Networking Needs

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Lionel Jouin; [2020]
    Keywords : ;

    Abstract : With the growing demand for mobile networks and specially IPMultimedia subsystem (IMS), new cloud native orchestration tools providing more flexibility and efficiency start to be used within telecommunication companies in order to improve the robustness and the reliability of these systems. However, Kubernetes, the most used among cloud native orchestration tools does not fulfill completelyall the needs and use cases in terms of networking the telecommunication industry meets. READ MORE