Sökning: "Computer Science with specialization in Computer Communication"
Visar resultat 6 - 10 av 35 avhandlingar innehållade orden Computer Science with specialization in Computer Communication.
6. Meteorological impact and transmission errors in outdoor wireless sensor networks
Sammanfattning : Wireless sensor networks have been deployed outdoors ever since their inception. They have been used in areas such as precision farming, tracking wildlife, and monitoring glaciers. These diverse application areas all have different requirements and constraints, shaping the way in which the sensor network communicates. LÄS MER
7. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks
Sammanfattning : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. LÄS MER
8. Towards a secure synchronous communication architecture for low-power wireless networks
Sammanfattning : The Internet of Things (IoT) is becoming the future Internet where most day-to-day devices are connected to the Internet. These devices are often resource constrained and use low-power wireless communication. Hence networks of them are called low-power and lossy networks (LLNs). LÄS MER
9. Robustness in low power wide area networks
Sammanfattning : During the past few years we have witnessed an emergence of Wide Area Networks in the Internet of Things area. There are several new technologies like LoRa, Wi-SUN, Sigfox, that offer long range communication and low power for low-bitrate applications. LÄS MER
10. Protocol, mobility and adversary models for the verification of security
Sammanfattning : The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. LÄS MER