Spelling suggestions: "subject:"telematikk"" "subject:"telematik""
131 |
Facebook in the Physical WorldMoen, Sverre Sveum January 2008 (has links)
<p>This thesis investigates the idea of bringing an online social community into a public space. The concept is about building a bridge between an online social community and the physical world. We built a prototype public display to test the concept. The system was capable of displaying pictures of people who were standing in front of the system, pinpointing peoples hometowns on a map, and showing pictures that related to their interests. A one week test run of the system was carried out. We examined if this concept resulted people in getting to know each other better. The results support that this system led individuals to learn about each other.</p>
|
132 |
Fast Implementation of Two Hash Algorithms on nVidia CUDA GPULerchundi Osa, Gorka January 2009 (has links)
<p>User needs increases as time passes. We started with computers like the size of a room where the perforated plaques did the same function as the current machine code object does and at present we are at a point where the number of processors within our graphic device unit its not enough for our requirements. A change in the evolution of computing is looming. We are in a transition where the sequential computation is losing ground on the benefit of the distributed. And not because of the birth of the new GPUs easily accessible this trend is novel but long before it was used for projects like SETI@Home, fightAIDS@Home, ClimatePrediction and there were shouting from the rooftops about what was to come. Grid computing was its formal name. Until now it was linked only to distributed systems over the network, but as this technology evolves it will take different meaning. nVidia with CUDA has been one of the first companies to make this kind of software package noteworthy. Instead of being a proof of concept its a real tool. Where the transition is expressed in greater magnitude in which the true artist is the programmer who uses it and achieves performance increases. As with many innovations, a community distributed worldwide has grown behind this software package and each one doing its bit. It is noteworthy that after CUDA release a lot of software developments grown like the cracking of the hitherto insurmountable WPA. With Sony-Toshiba-IBM (STI) alliance it could be said the same thing, it has a great community and great software (IBM is the company in charge of maintenance). Unlike nVidia is not as accessible as it is but IBM is powerful enough to enter home made supercomputing market. In this case, after IBM released the PS3 SDK, a notorious application was created using the benefits of parallel computing named Folding@Home. Its purpose is to, inter alia, find the cure for cancer. To sum up, this is only the beginning, and in this thesis is sized up the possibility of using this technology for accelerating cryptographic hash algorithms. BLUE MIDNIGHT WISH (The hash algorithm that is applied to the surgery) is undergone to an environment change adapting it to a parallel capable code for creating empirical measures that compare to the current sequential implementations. It will answer questions that nowadays havent been answered yet. BLUE MIDNIGHT WISH is a candidate hash function for the next NIST standard SHA-3, designed by professor Danilo Gligoroski from NTNU and Vlastimil Klima an independent cryptographer from Czech Republic. So far, from speed point of view BLUE MIDNIGHT WISH is on the top of the charts (generally on the second place right behind EDON-R - another hash function from professor Danilo Gligoroski). One part of the work on this thesis was to investigate is it possible to achieve faster speeds in processing of Blue Midnight Wish when the computations are distributed among the cores in a CUDA device card. My numerous experiments give a clear answer: NO. Although the answer is negative, it still has a significant scientific value. The point is that my work acknowledges viewpoints and standings of a part of the cryptographic community that is doubtful that the cryptographic primitives will benefit when executed in parallel in many cores in one CPU. Indeed, my experiments show that the communication costs between cores in CUDA outweigh by big margin the computational costs done inside one core (processor) unit.</p>
|
133 |
Mobile Remote LAN : Designing a modular service platformAschim, Lars Are, Martinsen, Lars January 2009 (has links)
<p>It is not uncommon for todays users to have access to more than one device, including PCs, PDAs and mobile phones. If the user wants to access services from a remote location, he has to manually customize a connection to each of these services. This thesis aims to make these kinds of services available without complex configuration, using a modular framework. As an example, new hardware or software might be needed in order to integrate home services and mobile devices. These circumstances make it hard for a regular user to deploy new services at home. At the same time people become more and more mobile, and users are moving from being passive consumers to interactive participants of the Internet. The general idea of ubiquitous communication between hosts in the Internet is brought down to a practical level by creating a use case where a user would like to search and retrieve files present in his home network while at a remote location. Solutions to non trivial challenges such as NAT and firewall implications, bandwidth restrictions, modular system architecture, and usability are examined to make a modular service platform meeting the demands of more interactive and mobile environments. The XMPP protocol, mostly known as an instant messaging and presence protocol, is utilized to create a web of trust between services and users. To achieve the goal of making a modular service platform, providing connectivity that allows services and users to be mobile, a working prototype has been made. The prototype consists of a modular service platform, enabling services to be added as plug-ins. The service platform is divided in two parts; one part enabling connectivity using a third party solution, and one part enabling a modular framework to add services as plug-ins. The functionality was tested with a network search as an example service, developed as a plug-in using the modular service platform.</p>
|
134 |
Session hijacking in WLAN based public networksBækkelund, Ørjan January 2009 (has links)
<p>The background for this masters thesis is the threat of session hijacking in public wireless networks. A public wireless network in this context is a network such as Wireless Trondheim where users with WLAN enabled devices can connect for a small fee for a given period of time. These kind of networks relies on having a high degree of user friendliness to reach users with average knowledge in computers and wireless networks. There is always a struggle between user friendliness and security and the downside to the user friendliness in these kind of networks is poor security. Many of these networks only use the unique identifier (MAC address) of the network device to identify users and grant them access. A person with some technical knowledge about wireless networks and less then honest intentions may exploit this weak security barrier and impersonate the legitimate user by duplicating the MAC address. The practical part of this master thesis starts with the setup of a test bench with three computers, an attacker, a legitimate client and a passive monitor. A MAC spoofing attack was performed on the production network to prove that this kind of attack is easy to perform. The attack was first done with Backtrack which is a specialized penetration testing OS and the same type of attack was done in Windows to also prove that it does not require specialized tools. The attacker was able to gain access to the Internet without going through the web page for authentication. The thesis also proposes some countermeasures against this kind of attack. They are session ID, MAC sequence number tracking and monitoring physical properties such as received signal strength and RTS-CTS handshake round trip times. The thesis presents some thoughts on how they can be implemented in the wireless Trondheim network and what the major difficulties of each of them might be. The thesis also makes an evaluation of how well each of them fit with Wireless Trondheims requirements for countermeasures against the attacks done in this thesis.</p>
|
135 |
Developing Android Applications with ArctisHaugsrud, Stephan January 2009 (has links)
<p>The focus of this thesis is the design of Android applications from building blocks in Arctis. The Arctis tool is used for modeling applications with UML activities, which already can be deployed on the Java ME and Java SE platforms. State machines and a runtime support system are generated. Creation of a generator for Arctis, enabling deployment to the Android platform, is the key element in this work. The Android platform is presented using an example application. A discussion on challenges, solutions and architectures for the design and implementation of Android applications using Arctis is presented. Then, the example application is redesigned using Arctis building blocks and deployed as a Java project using the existing code generator for Java SE. The adaptations necessary for turning the Java project into a runnable Android project is studied in detail and serves as a basis for the development of our code generator, along with the discussion. After describing our code generator, several building blocks are designed for an Android building block library. Demonstration of the code generator and the building blocks are done by designing and deploying an Android application named emph{TwitterFromAndroid}.</p>
|
136 |
Security in process control systemsSzostak, Rafal January 2009 (has links)
<p>PCS are used to control parts of the critical infrastructure of society, such as electric utilities, petroleum , water, waste, chemicals and pharmaceuticals amongst others. If the PCS become victims of cyber attacks, this can have severe consequences. The consequences may involve health and safety of human lives as well as having a huge impact on national and global economy. Since the merging of COTS and PCS, the previously isolated PCS now face new types of threats due to well-known flaws in COTS, as well as being connected to the Internet. Therefore the focus on securing PCS and ICS in general should get increased attention. In this thesis the laboratory system used was a scaled down PCS that could be tested on without any serious consequences. The laboratory system was delivered by Kongsberg Maritime. The OS is the first unit an attacker from the outside has contact with and it is used for controlling the other components of the system, therefore the OS is the main source of attention in this thesis. A scan was made on the OS to map the vulnerabilities of the OS. The scan was used as a basis for the attacks. Attacks were divided into attacks from the outside (Internet) and attacks from the inside. Under the circumstances of the testing on the laboratory PCS, many of the attacks tried were successful. A shell was planted in the OS, so an attacker could control it remotely, DoS attack flooded the OS and forced it to halt for a few seconds, VNC password was found enabling remote view and control of the OS, replay of packets was successful on the inside of the system making a man in the middle scenario possible. Despite the fact that the laboratory system may not have all the security mechanisms implemented, as the PCS systems in the industry does, the fact that the attacks on the laboratory system are possible may seem a bit disturbing. To prevent from the types of attacks described in this thesis steps has to be taken. Some of the prevention steps can be to regularly patch the system, use firewall filtering, monitor nodes in case of DoS, IDS monitoring and guidelines on system use.</p>
|
137 |
User Friendly Access Solutions for Mobile WiMAXTukkensæter, Brage Rønning January 2009 (has links)
<p>Today, WiMAX networks are deployed several places worldwide. To get access to these networks, users have to buy equipment specialized for one operator with a subscription. User equipment has earlier been stationary or mounted, but with the Mobile WiMAX amendment, smaller receivers are made possible. Mobile WiMAX allows users to move between different operators, making user access and roaming a more challenging task. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the users home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operators area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today. In this thesis, several Mobile WiMAX access solutions are discussed, emphasizing security and user friendliness. A captive portal solution is developed, and an EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) solution utilizing FreeRADIUS is planned. Security in WiMAX is compared to Wi-Fi very good. Even in an open WiMAX network traffic can be encrypted, this makes a WiMAX captive portal solution secure for most purposes. For traveling or visiting users, the EAP-TTLS solution may be complicated to use. Users need an account prior to the connection, or the visited operator needs roaming agreements with the users home operator. Roaming agreements are not common today, but is currently promoted by the WiMAX Forum. With the captive portal, users are able to buy access without having an account or subscription in advance. A captive portal solution is recommended for visiting users, and EAP-TTLS without roaming is recommended for users more permanently located in the operators area. EAP-based roaming may be deployed if roaming becomes more common in the future, but is not recommended today.</p>
|
138 |
Composing end-user servicesVaskinn, Jens Einar Heide January 2009 (has links)
<p>Service composition is currently a very hot topic in the Service Oriented Computing area. End-user programming is one aspect of this. This thesis proposes one such end-user programming environment for telecom services where a user can create, edit and set up a self defined behaviours when e.g. receiving calls or sms. The environment consists of services which can be used to program the desired behaviour. Some useful service is defined and a xml representation of them has been worked out. The thesis takes a scenario based approach to this and uses different real life composition scenarios to shed light on several aspects of the programming interface and service composition e.g. creating compositions, combining compositions and constraints.</p>
|
139 |
Collaboration-Oriented Modeling Of An Offshore Group Communication SystemDoan-Thi-Hong, Tam January 2009 (has links)
<p>This thesis studies the SPACE method by creating building blocks for a Push to Talk (PTT) service in WLAN environment. The structure and behavior of a PTT service is analyzed and discussed. We have modeled the behavior of a PTT service with the GUI of the PTT client. As a result, several of building blocks for a PTT service have been proposed. They can be stored in a library for a later reuse. We consider that the SPACE method well suited for developing a PTT service.</p>
|
140 |
Reliability Issues when Providing M2M Services in the Internet of ThingsGrimsmo, Sverre Bye January 2009 (has links)
<p>Overview of aspects that come into play when providing reliable Machine-to-Machine (M2M) services. Additionally the effect of an ever increasing number of M2M devices world wide will be analysed.</p>
|
Page generated in 0.0546 seconds