Essays about: "security mac"

Showing result 1 - 5 of 15 essays containing the words security mac.

  1. 1. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  2. 2. Integrating Jamming Detection into Low-power Mesh Networks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Wenbo Xiao; [2022]
    Keywords : ;

    Abstract : In the field of the Internet of Things (IoT), jamming attacks and anti-jamming countermeasures have always been a very important research directions. Jamming attacks are aimed at disturbing routine wireless communications by sending out intentional radio interference, which leads to packet loss, higher energy consumption, and even disruption of the whole network. READ MORE

  3. 3. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  4. 4. Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Anna Pestrea; [2021]
    Keywords : Fuzzer; fuzz-testing; eNB; LTE; air interface; MAC layer; MAC protocol;

    Abstract : In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. READ MORE

  5. 5. Evaluation of Cryptographic CRC in 65nm CMOS

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Yang Yu; [2017]
    Keywords : MAC; KMAC; cryptographic CRC; Simulation; Verilog HDL; MATLAB;

    Abstract : With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconnected to provide various services appealing to users. Many devices will get an access to valuable information which is likely to increase the number of malicious attacks on these devices in the future. READ MORE