Vehicular Group Membership Resilient to Malicious Attacks
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identif...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Programvara och system
2019
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086 |
id |
ndltd-UPSALLA1-oai-DiVA.org-liu-158086 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-liu-1580862019-06-26T22:11:50ZVehicular Group Membership Resilient to Malicious AttacksengFischer, BenjaminLinköpings universitet, Programvara och system2019SLMPdistributed systemsecurityVPKICommunication SystemsKommunikationssystemThere is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce new problems. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
SLMP distributed system security VPKI Communication Systems Kommunikationssystem |
spellingShingle |
SLMP distributed system security VPKI Communication Systems Kommunikationssystem Fischer, Benjamin Vehicular Group Membership Resilient to Malicious Attacks |
description |
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce new problems. |
author |
Fischer, Benjamin |
author_facet |
Fischer, Benjamin |
author_sort |
Fischer, Benjamin |
title |
Vehicular Group Membership Resilient to Malicious Attacks |
title_short |
Vehicular Group Membership Resilient to Malicious Attacks |
title_full |
Vehicular Group Membership Resilient to Malicious Attacks |
title_fullStr |
Vehicular Group Membership Resilient to Malicious Attacks |
title_full_unstemmed |
Vehicular Group Membership Resilient to Malicious Attacks |
title_sort |
vehicular group membership resilient to malicious attacks |
publisher |
Linköpings universitet, Programvara och system |
publishDate |
2019 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086 |
work_keys_str_mv |
AT fischerbenjamin vehiculargroupmembershipresilienttomaliciousattacks |
_version_ |
1719209517838761984 |