Sökning: "RAN security"

Visar resultat 1 - 5 av 14 uppsatser innehållade orden RAN security.

  1. 1. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    Master-uppsats, Linköpings universitet/Databas och informationsteknik

    Författare :Mirna Ghazzawi; Adil Imran; [2023]
    Nyckelord :Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Sammanfattning : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. LÄS MER

  2. 2. Exploring true random number generators Build on commercial-off-the-shelve Components

    M1-uppsats, Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)

    Författare :Linnéa Mörk; [2023]
    Nyckelord :TRNG; RNG; Random number generator; commercial-off-the-shelve;

    Sammanfattning : Generating random numbers can be accomplished through various methods, with the primary distinction lying between pseudo-random number generators (PRNGs), which are commonly used for applications that require a large amount of random data, and true random number generators (TRNGs), which are commonly used for applications that need security and unpredictability. This thesis explores the feasibility of harnessing frequency variations in the electrical grid as a source of entropy for a TRNG. LÄS MER

  3. 3. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Luca Staboli; [2022]
    Nyckelord :Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface; Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface;

    Sammanfattning : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. LÄS MER

  4. 4. Security vs performance in a real-time separation kernel : An analysis for multicore RISC-V architecture

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Henrik Kultala; [2022]
    Nyckelord :Separation kernel; RISC-V; Multicore; Real-time system; Performance analysis; Open-source; Separationskärna; RISC-V; Multicore; Realtidssystem; Prestandaanalys; Öppen källkod;

    Sammanfattning : In this thesis, we explored the possibility of introducing a few vulnerabilities to a separation kernel to increase its performance. We made modifications to S3K, an open-source separation kernel that is in the final stages of being designed. LÄS MER

  5. 5. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Yousef Hashem; Elmedin Zildzic; [2022]
    Nyckelord :intrusion detection; wazuh; security; edr; intrusion response;

    Sammanfattning : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. LÄS MER