Sökning: "Data Tampering"

Visar resultat 6 - 10 av 20 uppsatser innehållade orden Data Tampering.

  1. 6. Protocol-aware fuzzing of DTLS

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Rahbar Ghori; [2021]
    Nyckelord :;

    Sammanfattning : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. LÄS MER

  2. 7. Efficient Security Protocol for RESTful IoT devices

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Karnarjun Kantharajan; Sahar Shirafkan; [2020]
    Nyckelord :Internet of Things IoT ; TLS 1.2 1.3; DTLS 1.2; OSCORE; CoAP; Security Protocols.; Technology and Engineering;

    Sammanfattning : In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1. LÄS MER

  3. 8. Data tampering in Vehicle CAN Bus networks

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Elpidoforos Arapantonis; [2019]
    Nyckelord :Automotive Cyber Security; CAN bus vulnerabilities; Raspberry Pi; Arduino; Instrument Cluster;

    Sammanfattning : The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. LÄS MER

  4. 9. Characterization of FPGA-based Arbiter Physical Unclonable Functions

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jingnan Shao; [2019]
    Nyckelord :Arbiter PUF; FPGA; Altera; Verilog HDL; Arbiter PUF; FPGA; Altera; Verilog HDL;

    Sammanfattning : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. LÄS MER

  5. 10. Intelligent Decision Support Systems for Compliance Options : A Systematic Literature Review and Simulation

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :SIVA VENKATA PRASAD PATTA; [2019]
    Nyckelord :Verified Gross mass; International Maritime Organization; Safety of Life at Sea; Decision Support System; Simulation; Data Tampering; Support vector machine SVM ;

    Sammanfattning : The project revolves around logistics and its adoption to the new rules. Theobjective of this project is to focus on minimizing data tampering to the lowest level possible.To achieve the set goals in this project, Decision support system and simulation havebeen used. LÄS MER