Essays about: "secure protocol design"

Showing result 1 - 5 of 36 essays containing the words secure protocol design.

  1. 1. Comparative Analysis of In-Body to Out-Body Wireless CommunicationModules: Test Design and PerformanceEvaluation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Remya Sree Rema Bhai; Sisymol Stellus; [2024]
    Keywords : In-Body to Off-Body Communication; prototype; test-design; test protocol; medical device; wireless communication.;

    Abstract : Wireless communication for biomedical equipment is rapidly improving with the invention of new technologies. Due to the absence of cables, wireless technology is a growing area of interest for biomedical applications. As technology advances, many gadgets are becoming smaller and more portable. READ MORE

  2. 2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  3. 3. Privacy Enhancing Data Reporting System For Participatory Sensing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tomasz Jakub Czajęcki; [2022]
    Keywords : Participatory sensing; data aggregation; MPC; Bluetooth;

    Abstract : Privacy is a crucial aspect of any system involving user-supplied data. There exist multiple approaches to protecting the identity and secrecy of users in data submission systems. In this thesis, I consider the case of privacy-enhancing of data reporting in Participatory Sensing systems. READ MORE

  4. 4. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE

  5. 5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE