Browsing by Author "Arkko, Jari"
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
- Analysis tool for studying IP security Denial of Service resistance
Helsinki University of Technology | Master's thesis(2002) Müller, Mika - Asiantuntijajärjestelmäkielen optimoitu toteutus
Helsinki University of Technology | Master's thesis(1989) Arkko, Jari - Cloud Computing Applications in Tunnel Servers
Perustieteiden korkeakoulu | Master's thesis(2023-03-20) Eigelis, ErikasThe protection of online data has been ever increasing point of interest for many in recent times. This led to increasing popularity in public VPN and proxy server providers who promise hassle-free privacy for their users. However, in many cases, there is no guarantee that the service used is actually secure and that the browsing data that passes through the servers is protected and not shared with any third parties. The topic of this thesis comes from the idea of finding a way to introduce a technical solution that would allow users to verify the trustworthiness of the service rather than just trusting the service provider. Confidential Computing technologies seem like a viable solution for such purpose therefore, it was decided to implement a proxy server that could run in a secure enclave that could ensure the protection of user data in a way that not even the host of the server would not be able to see the data inside the enclave. The solution was implemented with Go programming language and using EGo framework that allows compiling an application for a secure enclave and regular environment thus giving providing an opportunity to test the bottlenecks introduced by a secure enclave environment compared to a regular environment. The implemented proxy is functional, though it does introduce a significant reduction in bandwidth, which mostly stems from the limitations in the current EGo framework implementation. This means that with further improvements running a proxy server in a secure enclave could become a viable solution. - Conformance Test Generation from Non-deterministic Specifications
Helsinki University of Technology | Licentiate thesis(1995) Arkko, Jari - Conformance testing in a distributed testing architecture
Helsinki University of Technology | Master's thesis(1995) Rautiainen, Aapo - Extended Emacs Editor for AXE Telephone Exchange Programming in Workstation Environment
Helsinki University of Technology | Master's thesis(1992) Rabb, Harry - Perpetual battery life for Machine to Machine communication devices with cellular access
Sähkötekniikan korkeakoulu | Master's thesis(2013-04-22) Mir, MuhammadThe advent of Machine to Machine (M2M) communication has opened up new avenues for the mobile operators and also for the equipment vendors. The ecosystem of communication is fast emerging in to a new dimension. However to make the new realm of M2M communication feasible, there is a need to reduce the power consumption of these devices. Research is being carried out in several directions to reduce the power consumption. Research work has been done to develop new network topologies, architecture and also improve the electronics and embedded systems to reduce power consumption. This thesis explores the third direction which is concerned with developing a prototype using the existing electronics and cellular access techniques to explore the possibility of improving power consumption. This is concerned also with using energy harvesting for recharging the battery supplies. The development of the prototype is aimed at using a CPU, cellular access device and rechargeable power system to develop M2M device with battery time in terms of years. We will be using the concept of sleeping devices to enable infinite battery times. The aim of the research is to find sleep times which may lead to sufficiently longer battery times and hence provide a prototype of M2M device with energy harvesting solution capable to have independent power source for years. - Security in smart object networks
Perustieteiden korkeakoulu | Master's thesis(2012) Sethi, MohitInternet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes. This involves the inter-connection of a large number of heterogeneous networked entities and networks. Emergence of technologies such as Zigbee, Bluetooth low energy and embedded sensors has transformed simple physical devices into smart objects that can understand and react to their environment. Such smart objects form the building blocks for the Internet of Things. The communication infrastructure for these objects is based on an extension of the Internet protocol stack. Although the need for security is widely accepted, there is no clear consensus on how IP-based Internet security protocols can be applied to resource-constrained smart object networks. In this thesis, we develop a new secure and energy efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks. We contribute to the standardization of the generic communication architecture by adding security and delegation components for smart objects that sleep for large amounts of time during their operational phase. This architecture ensures data integrity and authenticity over a multi-hop network topology. It also provides a mirroring mechanism that uses a proxy to serve data on behalf of sleeping smart objects, thereby allowing them to act as always-online web servers. A working prototype implementation of the architecture is also developed. The security features in the architecture presented in this thesis are based on using strong public-key cryptography. Contrary to popular belief, our performance evaluation shows that asymmetric public-key cryptography can be implemented on small 8-bit micro-controllers without modifying the underlying cryptographic algorithms. - UAV location privacy in the context of Integrated Sensing And Communication
School of Science | Master's thesis(2024-09-23) Ali, FarjadThis thesis investigates the implication of upcoming technologies on the location privacy of Uncrewed Aerial Systems (UAS), with a specific focus on RemoteID (RID) and Integrated Sensing and Communication (ISAC) technologies. While RemoteID, a technology mandated by most laws, requires Uncrewed Aerial Vehicles (UAV) to transmit positional data for tracking purposes periodically, recent developments in 6G aim to augment mobile communication network capabilities through ISAC. ISAC will allow the network to sense and detect changes in the surrounding environment, providing a new source of information for UAV tracking. Existing studies examine the impact of RID on UAV location privacy, lacking considerations for ISAC. This study fills that gap by comparing RID and ISAC in terms of regulatory, reliability, and overall impact on UAV location privacy. The research employs a qualitative and quantitative approach, combining a literature review, comparative analysis, data generation, and location-tracking methods. Custom data generation was used to create synthetic datasets comprising UAV flight trajectories, RID data, and ISAC sensing data. Novel location tracking methods using Kalman filters and data association techniques were designed to assess the location privacy leakage caused by ISAC. The results indicate that ISAC aggravates the status quo of UAV location privacy, as unassociated ISAC sensing data can be used to reliably reconstruct the flight trajectory of UAVs, which can be used to address the shortcomings of reconstruction methods based on RID data. However, the study highlights the limits of location tracking and data generation methods, particularly radio propagation simulation abilities. The findings also outline the need for more accurate simulations and improved location tracking methods in future studies to further understand UAV location privacy risks. The thesis contributes to the field by presenting the first comprehensive analysis of the impact of ISAC on UAV location privacy, developing a novel dataset generation method, and proposing a new approach to UAV location tracking using ISAC data. The study also offers some initial recommendations for ISAC sensing data limitation to mitigate its associated risks.