Vehicular Group Membership Resilient to Malicious Attacks

There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identif...

Full description

Bibliographic Details
Main Author: Fischer, Benjamin
Format: Others
Language:English
Published: Linköpings universitet, Programvara och system 2019
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086
id ndltd-UPSALLA1-oai-DiVA.org-liu-158086
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-liu-1580862019-06-26T22:11:50ZVehicular Group Membership Resilient to Malicious AttacksengFischer, BenjaminLinköpings universitet, Programvara och system2019SLMPdistributed systemsecurityVPKICommunication SystemsKommunikationssystemThere is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce new problems.  Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic SLMP
distributed system
security
VPKI
Communication Systems
Kommunikationssystem
spellingShingle SLMP
distributed system
security
VPKI
Communication Systems
Kommunikationssystem
Fischer, Benjamin
Vehicular Group Membership Resilient to Malicious Attacks
description There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce new problems. 
author Fischer, Benjamin
author_facet Fischer, Benjamin
author_sort Fischer, Benjamin
title Vehicular Group Membership Resilient to Malicious Attacks
title_short Vehicular Group Membership Resilient to Malicious Attacks
title_full Vehicular Group Membership Resilient to Malicious Attacks
title_fullStr Vehicular Group Membership Resilient to Malicious Attacks
title_full_unstemmed Vehicular Group Membership Resilient to Malicious Attacks
title_sort vehicular group membership resilient to malicious attacks
publisher Linköpings universitet, Programvara och system
publishDate 2019
url http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086
work_keys_str_mv AT fischerbenjamin vehiculargroupmembershipresilienttomaliciousattacks
_version_ 1719209517838761984