Sökning: "802.1x"
Visar resultat 1 - 5 av 20 uppsatser innehållade ordet 802.1x.
1. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS
Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknikSammanfattning : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. LÄS MER
2. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. LÄS MER
3. Åtkomst nekad : Autentisering och säkerhetsrutiner för lokala nätverk
Kandidat-uppsats, Mälardalens universitet/Inbyggda systemSammanfattning : In the field of Cybersecurity, it is essential to know who is connected to your system. The functionality for Authentication of connecting users in the local area network is in the focus for this report. There exist various authentication protocols, however in this report IEEE 802. LÄS MER
4. Improving Security In Embedded Systems With IEEE 802.1X
Kandidat-uppsats, Mälardalens högskola/Akademin för innovation, design och teknikSammanfattning : .... LÄS MER
5. Evaluation of Key Management Protocols and Their Implementations
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : When constructing a network system it is important to consider the attributes which define said system and how to best build around those attributes. In this report we’ve studied Key Management Protocols as well as 802.15.4 WPAN networks and how key managment is conducted in such networks. LÄS MER