Sökning: "Impersonation Attacks"
Hittade 4 uppsatser innehållade orden Impersonation Attacks.
1. Formal security verification of the Drone Remote Identification Protocol using Tamarin
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. LÄS MER
2. Simulating ADS-B vulnerabilities by imitating aircrafts : Using an air traffic management simulator
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Air traffic communication is one of the most vital systems for air traffic management controllers. It is used every day to allow millions of people to travel safely and efficiently across the globe. LÄS MER
3. Detecting Impersonation Attacks in a Static WSN
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The current state of security found in the IoT domain is highly flawed, a major problem being that the cryptographic keys used for authentication can be easily extracted and thus enable a myriad of impersonation attacks. In this MSc thesis a study is done of an authentication mechanism called device fingerprinting. LÄS MER
4. Authentication and Authorization Systems in Cloud Environments
Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. LÄS MER