Essays about: "security system for gsm"

Showing result 1 - 5 of 10 essays containing the words security system for gsm.

  1. 1. Penetration Testing of GSM Alarm : Using Radio Frequency Communication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Ringvall; Oscar Ekholm; [2020]
    Keywords : ;

    Abstract : As we rely more and more on technological devices in our daily lives, it is increasingly important that these devices are secure. We examined a GSMalarm system, the Home Secure Basic V2, from a security perspective with the purpose of finding an exploit that could disable the alarm. READ MORE

  2. 2. Train-borne Antennas : A business case study

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Georgios Michailidis; [2014]
    Keywords : Railway; Train-Borne Antennas; Radio Systems; Signalling; ERTMS; PTC; LTE; MIMO Business model canvas; SWOT analysis;

    Abstract : The global rail network every year is used to transport approximately 21 billion of people and 10 billion tons of cargo. These numbers is estimated that are going to increase in the future. Railway will become the transportation of the future. READ MORE

  3. 3. System Integrity for Smartphones : A security evaluation of iOS and BlackBerry OS

    University essay from Informationskodning

    Author : Fredrik Hansson; [2011]
    Keywords : Smartphone; Integrity; iOS; BlackBerry OS; Risk analysis;

    Abstract : Smartphones are one of the most popular technology gadgets on the market today. The number of devices in the world is growing incredibly fast and they have today taken an important place in many person's everyday life. READ MORE

  4. 4. Two Way Mobile Authentication System

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Karthik Mandava; Harish Dinne; [2010]
    Keywords : Two factor authentication; One Time Password OTP ; Demo online Banking application; computer security; mobile device for authentication;

    Abstract : The ever increasing use of internet around the world has without doubt increased the usage of internet based services, e-business models, easier ways of communication and information sharing. Such drastic increase in usage of network based systems has made the current cyber security systems old dated as the hackers and attackers of networked systems is on the rise with new and modern attack methodologies. READ MORE

  5. 5. Evaluation of UICC-based IMS authentication schemes

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : Adeel Jadoon; [2009]
    Keywords : UICC; IMS;

    Abstract : This thesis study involves evaluation of UICC based IMS authentication schemes. The schemes included in this study are IMS AKA, E-IMS AKA, One-Pass GPRS IMS authentication and Early IMS security. These schemes are evaluated on the basis of security, user friendliness and simplicity. READ MORE