Essays about: "thesis about mac"

Showing result 1 - 5 of 12 essays containing the words thesis about mac.

  1. 1. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  2. 2. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  3. 3. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  4. 4. Energy-Efficient Communication with Lightweight M2M in IoT Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Gonzalo Peces; [2018]
    Keywords : IoT; LwM2M; low power consumption; TSCH; Contiki-NG; Eclipse Leshan.; IoT; LwM2M; låg energiförbrukning; TSCH; Contiki-NG; Eclipse Leshan.;

    Abstract : OMA’s Lightweight Machine to Machine (LwM2M) is an application protocol for device management in the Internet of Things (IoT) that has been recently published and widely adopted in a lot of projects. The protocol is designed to operate in sensor networks and machine-to-machine environments, where one of the main constraints is the energy consumption since the nodes are usually battery powered. READ MORE

  5. 5. Analysis of IPv6 Neighbor Discovery for Mobile and Wireless Networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jeena Rachel John; Hariharasudhan Vigneswaran; [2015]
    Keywords : Linux; Radvd; NDP; IPv6; 802.11; Wireshark; Virtual Box; DAD; NEAR; Technology and Engineering;

    Abstract : The majority of the current 3GPP and M2M networks use or will use IPv6 for accessing the internet. These IPv6 networks use Neighbor Discovery as defined in RFC 4861 to identify their neighbors on the link and see if they are active. READ MORE