Essays about: "secure protocol"

Showing result 16 - 20 of 164 essays containing the words secure protocol.

  1. 16. Determining whether the Hövding bicycle airbag is secure against cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Mellin; [2022]
    Keywords : Penetrationtesting; Internet of Things; Threatmodeling; BluetoothLowEnergy; Firmware analysis; Reverse engineering; Penetrationstestning; Sakernasinternet; Hotmodellering; BluetoothLowEnergy; Analys of fast programvara; Baklängeskonstruktion;

    Abstract : This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. READ MORE

  2. 17. Performance Evaluation of Various QUIC Implementations : Performance and Sustainability of QUIC Implementations on the Cloud

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Feter Akira Vedaalana Sitepu; [2022]
    Keywords : QUIC Protocol; HTTP 3; Picoquic; Quiche; Performance Evaluation; Cloud deployment; Sustainability;

    Abstract : QUIC is a new secure multiplexed transport protocol built on top of UDP. This general-purpose transport protocol aims to provide the lowest connection latency possible and solve the shortcomings of TCP, UDP, and current problems of the internet. READ MORE

  3. 18. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE

  4. 19. Bootstrapping Secure Sensor Networks in the Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Edman; [2022]
    Keywords : Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE

  5. 20. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE