Essays about: "spoofing"

Showing result 1 - 5 of 24 essays containing the word spoofing.

  1. 1. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rafi Aram Yadward Malkhasian; [2021]
    Keywords : ;

    Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE

  2. 2. A Comparison of Smartphone GPSL1 and Galileo E1-B/C Spoofing Resilience

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Torbjörn Leksell; [2021]
    Keywords : GNSS; Spoofing; GPS; Galileo; Smartphone; GPU; Signal Simulation; GNSS; Förfalskning; GPS; Galileo; Smarttelefon; GPU; Signalsimulator;

    Abstract : Location-based services have grown in importance as smartphones, and location-based applications have become an integral part of everyday life. While Global Navigation Satellite Systems (GNSSs) provide the most accurate position determination, open service GNSS signals remain unprotected and susceptible to spoofing attacks. READ MORE

  3. 3. BankID-based Authentication for Phone Calls

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Göransson; Emma Asklund; [2020]
    Keywords : Electronic identification; BankID; authentication; social engineering; phone calls; spoofing; Technology and Engineering;

    Abstract : Authentication for phone calls is important for companies with hundreds of customers wanting to access sensitive information. However, it is sub-par compared to authentication when using applications or websites. In this thesis, seven models have been developed for how to use BankID as the authentication service during phone calls. READ MORE

  4. 4. Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Jan Rozenbeek; [2020]
    Keywords : C-UAS; Drone; UAV; Counter-drone; Jamming; GPS Spoofing;

    Abstract : The usage of drones is steadily increasing as drones are becoming more available and useful to the general public, but drone usage also leads to problems as for example airports have had to shutdown due to drone sightings. It has become clear that a counter-drone system must be in place to neutralize intruding drones. READ MORE

  5. 5. Autonomous Landing of an Unmanned Aerial Vehicle on an Unmanned Ground Vehicle in a GNSS-denied scenario

    University essay from Linköpings universitet/Reglerteknik; Linköpings universitet/Reglerteknik

    Author : Alexander Källström; Albin Andersson Jagesten; [2020]
    Keywords : Unmanned Aerial Vehicle; Unmanned Ground Vehicle; Autonomous Landing; Ultra-Wide Band; Proportional Navigation; GNSS-denied Scenario; Gazebo;

    Abstract : An autonomous system consisting of an unmanned aerial vehicle (UAV) in cooperation with an unmanned ground vehicle (UGV) is of interest in applications for military reconnaissance, surveillance and target acquisition (RSTA). The basic idea of such a system is to take advantage of the vehicles strengths and counteract their weaknesses. READ MORE