Sökning: "Impersonation Attacks"

Hittade 4 uppsatser innehållade orden Impersonation Attacks.

  1. 1. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Jakob Ahokas; Jonathan Persson; [2022]
    Nyckelord :Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Sammanfattning : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. LÄS MER

  2. 2. Simulating ADS-B vulnerabilities by imitating aircrafts : Using an air traffic management simulator

    Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Axel Boström; Oliver Börjesson; [2022]
    Nyckelord :ADS-B; ATC; Impersonation attack; Sybil attack; Air Traffic Communication; openScope; Security; Machine learning; K nearest neighbour; Naive Bayes; Decision tree;

    Sammanfattning : Air traffic communication is one of the most vital systems for air traffic management controllers. It is used every day to allow millions of people to travel safely and efficiently across the globe. LÄS MER

  3. 3. Detecting Impersonation Attacks in a Static WSN

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Viktor Selleby; Anton Lin; [2017]
    Nyckelord :Device Fingerprinting; IoT; Machine Learning; Machine to Machine Authentication; Impersonation Attacks; Spoofing Attacks; Wireless Sensor Network; Technology and Engineering;

    Sammanfattning : The current state of security found in the IoT domain is highly flawed, a major problem being that the cryptographic keys used for authentication can be easily extracted and thus enable a myriad of impersonation attacks. In this MSc thesis a study is done of an authentication mechanism called device fingerprinting. LÄS MER

  4. 4. Authentication and Authorization Systems in Cloud Environments

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Davit Hakobyan; [2012]
    Nyckelord :;

    Sammanfattning : The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. LÄS MER