Essays about: "study on network security on protocol"

Showing result 1 - 5 of 39 essays containing the words study on network security on protocol.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  3. 3. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Fault Tolerant Stabilizability in Multihop Control Networks

    University essay from Uppsala universitet/Avdelningen för systemteknik

    Author : Rana Faheem Iftikhar; [2023]
    Keywords : wireless networked control systems; Fault detection and isolation; Multihop control networks; WirelessHART; IT security; relay nodes failure; Design Wireless sensor network;

    Abstract : The integration of control systems with wireless communication networks has gainedsignificant popularity, leading to the emergence of wireless networked control systems(WNCS). WNCS comprises wireless devices such as sensors, actuators, andcontrollers that work together to ensure system stabilizability. READ MORE