Sökning: "Physical layer authentication"

Visar resultat 1 - 5 av 6 uppsatser innehållade orden Physical layer authentication.

  1. 1. Authentication Techniques Based on Physical Layer Attributes

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xintai Liang; [2022]
    Nyckelord :Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Sammanfattning : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. LÄS MER

  2. 2. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Tanyi Frankeline; [2019]
    Nyckelord :SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Sammanfattning : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. LÄS MER

  3. 3. Channel-Based Intrusion Detection at the LTE Physical Layer

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Bjarki Mar Benediktsson; [2019]
    Nyckelord :;

    Sammanfattning : Long Term Evolution (LTE) is the most widespread cellular technology around the globe. An LTE device must communicate with base stations without encryption and authentication before a connection to a network is established and security steps executed. LÄS MER

  4. 4. Security in Internet of Things

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Yuanjun Song; [2013]
    Nyckelord :Internet of Things; IoT; security; addressing model; access model.;

    Sammanfattning : The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics. LÄS MER

  5. 5. Security analysis of the WiMAX technology in Wireless Mesh networks

    Master-uppsats, Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Författare :Md. Rezaul Karim Siddiqui; Sayed Mohammad Atiqur Rahman; [2009]
    Nyckelord :IEEE 802.16; WiMAX; Mesh mode; Mesh network; Vulnerability; Security threats ;

    Sammanfattning : The IEEE 802.16 (WiMAX) is the promising technique to overcome some disadvantages on the Security concern of the widespread IEEE 802.11 standard. For providing high speed wide area broadband wireless access, WiMAX is an emerging wireless technology for creating multi-hop Mesh network. LÄS MER