Essays about: "mobile security"

Showing result 6 - 10 of 294 essays containing the words mobile security.

  1. 6. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  2. 7. Exploring the benefits, limitations and drawbacks of using LoRa with UAVs and AMRs for Warehouse Management : A study on behalf of Proton Finishing AB

    University essay from Linnéuniversitetet/Institutionen för management (MAN)

    Author : Daniel Claesson; Noah Palmqvist; [2023]
    Keywords : LoRa; UAV; AMR; Warehouse Management; Security Risks; Environmental Sustainability;

    Abstract : This study explores the potential benefits, limitations and drawbacks of usingLoRa with unmanned aerial vehicles (UAVs) and autonomous mobile robots (AMRs)together for warehouse management. Three research concerns are looked at in order toprovide a full analysis of the topic. READ MORE

  3. 8. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  4. 9. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Swaroop Divya Sai Prem Nambala; Dexin Kong; [2023]
    Keywords : Reconfigurable intelligent surface; RIS; optimization; Ray-tracing; Mixed integer linear programming MILP ; Complex impulse response; Wireless Insite.; Technology and Engineering;

    Abstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE

  5. 10. Assessing the threat of Stingrays in 4G cellular networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Emil Karim; Sina Khoraman; [2023]
    Keywords : Cellular network; Wireless communication; Stingray; Privacy; Surveillance; Tracking; 4G; Software-defined radio; Cellulärt nätverk; Trådlös kommunikation; Stingray; Integritet; Övervakning; Spårning; 4G; Mjukvarudefinierad radio;

    Abstract : This bachelor thesis explores the threat of Stingrays, fake cell towers, to the mobile network. The increasing availability of open-source technology and hardware has made it easier to build Stingrays. READ MORE