Change search
ReferencesLink to record
Permanent link

Direct link
Connect street light control devices in a secure network
Halmstad University.
Halmstad University.
Halmstad University.
2015 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Wireless communications is a constantly progressing technology in network engineering society, creating an environment full of opportunities that are targeting in financial growth, quality of life and humans prosperity. Wireless security is the science that has as a goal to provide safe data communication between authorized users and prevent unauthorized users from gaining access, deny access, damage or counterfeit data in a wireless environment. In order to success it uses layers of protection that consist of software and hardware mechanisms that are able to monitor network’s behavior and in coordination provide a safe and secure environment for the user. In this thesis, a scientific research will be conducted in a given wireless network topology designed for an original application. This is about an intelligent street lightning system and it has already been implemented by Greinon Engineering which is the company that we are cooperating with. It is a matter of great importance that this thesis was conducted under real life criteria and in cooperation with an engineering company. This means that our programming, our ideas, our study research were all rotated and concentrated in certain type of hardware – software and network topology. In this thesis there is a detailed overview of basic wireless security mechanisms – vulnerabilities – types of attacks and countermeasures focused on 802.11b protocol. Moreover there will be security weak point’s analysis on the given industrial network; our proposals to protect and secure this network based on our threat analysis of the current system. There is an analysis on the most up to date VPN security implementations and reasoning that guided our team to conclude in a specific procedure - protocol and implementation, including limitation factors – obstacles faces during this procedure. During this research iterative approach in procedures – ideas and implementation attempts is followed. Basic goal is to provide security solutions that are easy applicable, low cost, easy to maintain and monitor.

Place, publisher, year, edition, pages
2015. , 60 p.
Keyword [en]
Network Security
National Category
URN: urn:nbn:se:hh:diva-28180OAI: diva2:808685
Subject / course
Computer Network Engineering
Available from: 2015-04-29 Created: 2015-04-29 Last updated: 2015-04-29Bibliographically approved

Open Access in DiVA

fulltext(1556 kB)327 downloads
File information
File name FULLTEXT01.pdfFile size 1556 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Halmstad University

Search outside of DiVA

GoogleGoogle Scholar
Total: 327 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 171 hits
ReferencesLink to record
Permanent link

Direct link