• Investigation of LTE Privacy Attacks by Exploiting the Paging Mechanism 

      Zhou, Shelley Xianyu (Master thesis, 2018)
      In mobile communication in general, and LTE in particular, security should be a main focus, also because of the vulnerabilities introduced by the radio link. Compared to GSM and UMTS, the LTE security has been improved. ...
    • LogWheels: A Security Log Visualizer 

      Egeland, Vegard (Master thesis, 2011)
      Logging security incidents is a required security measure in every moderately complex computer system. But while most systems produce large quantities of textual logs, these logs are often neglected or infrequently monitored ...
    • Modelling the Optimal Link Length in Wireless Sensor Networks for Two Different Media Access Protocols 

      Øvsthus, Knut; Nilsen, Espen; Kampen, Anne-Lena; Kure, Øivind (Journal article; Peer reviewed, 2015)
      Conservation of energy is one of the main challenges in designing a wireless sensor network (WSN). The reason is that these large scaled networks cannot be arranged, configured, or maintained manually. Thus, automated ...
    • A network design algorithm for multicast communication architectures in smart transmission grids 

      Adrah, Charles Mawutor; Palma, David; Kure, Øivind; Heegaard, Poul Einar (Peer reviewed; Journal article, 2020)
      In future smart transmission grids, there are distributed applications that will benefit from the deployment of Internet Protocol (IP) multicast technology for communication. Sharing of Routable-Sample Values (R-SV) and ...
    • Optimizing Publish/Subscribe Systems with Congestion Handling 

      Arianfar, Somaya (Master thesis, 2008)
      Despite its success, the Internet suffers from major shortcomings. Nowadays there is lot of attention toward changing the Internet architecture, in different layers to cope to challenges of high traffic demands and new ...
    • Performance evaluation of nsclick simulator for Mobile Ad Hoc Networks 

      Thi Minh Do, Viet; Xie, Lang; Kure, Øivind (Journal article; Peer reviewed, 2011)
      In order to evaluate the behavior and performance of protocols for Mobile Ad Hoc Networks (MANETs) both simulation and test bed are often used. The simulation is used in first stages and the test bed is used in final stages ...
    • Performance Evaluation of V2V and V2I Messages in C-ITS 

      Tubbene, Halvard (Master thesis, 2015)
      The Cooperative Intelligent Transport System (C-ITS), a system where vehicles cooperate in order to improve traffic safety and efficiency, have recently received a lot of attention. There are several standardization ...
    • Privacy Leakage in Fitness Equipment Communication 

      Svenskerud, Benedicte Væting (Master thesis, 2018)
      The technology is constantly evolving with use of personal data as a central component of new applications and services. At the same time, physical activity has become an important part of the modern society. This has led ...
    • Resilient internetwork routing over heterogeneous mobile military networks 

      Landmark, Lars; Larsen, Erlend; Hauge, Mariann; Kure, Øivind (Journal article; Peer reviewed, 2015)
      Mobile networks in the military tactical domain, include a range of radio networks with very diverse characteristics and which may be employed differently from operation to operation. When interconnecting networks with ...
    • SDN in Heterogeneous Mobile Tactical Networks 

      Fagervoll, Håvard Magne (Master thesis, 2017)
      Military operations are increasingly dependent on networks and transferring of data. A heterogeneous mobile tactical network, is a complex network with dynamic characteristics used during military operations. In the field, ...
    • SDN Spotlight: A real-time OpenFlow troubleshooting framework 

      Aryan, Ramtin; Yazidi, Anis; Brattensborg, Frode; Kure, Øivind; Engelstad, Paal E. (Journal article; Peer reviewed, 2022)
      Troubleshooting in SDN-based networks is still a cumbersome task that can overwhelm human attention. Various anomalies, such as installation failure, disordered rules, and loops, remain unnoticed even when the most recent ...
    • Seamless Access to Home Content 

      Høiby, Ola (Master thesis, 2006)
      This thesis documents the mobile phone authentication in the data world and evaluate potential methods for seamless authentication. Telenors Mobil's authentication tool and Wap Gateway have been configured to provide the ...
    • SIP-basert Proaktiv Handover 

      Afrazi, Mohammad (Master thesis, 2008)
      Utviklingen innen informasjons- og kommunikasjonsteknologi går raskt. Stadig flere løsninger og tjenester blir tilgjenglige over internett, ulike teknologier smelter sammen og det er en eksplosiv økning i mobile brukere ...
    • A Survey of 802.15.4 TSCH Schedulers for a Standardized Industrial Internet of Things 

      Urke, Andreas Ramstad; Kure, Øivind; Øvsthus, Knut (Peer reviewed; Journal article, 2021)
      Concepts such as Industry 4.0 and Cyber-Physical Systems may bring forward a new industrial revolution. These concepts require extensive connectivity far beyond what is provided by traditional industrial networks. The ...
    • Survey of Key Management in Ad Hoc Networks 

      Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål (Journal article; Peer reviewed, 2006)
      The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes ...
    • Traffic Policing in Dynamic Military Networks Using Software Defined Networking 

      Skappel, Hans Fredrik (Master thesis, 2016)
      This thesis looks at how Software Defined Networking (SDN) can be used to provide traffic engineering and to police traffic in an Operational Military Network (OMN). SDN is a concept where the control plane is separated ...
    • Trusted secure service design: Enhancing trust with the future sim-cards 

      Vilarinho, Thomas Carlyle (Master thesis, 2009)
      The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this ...
    • Wireless Sensor Networks, energy efficiency and path recovery 

      Kampen, Anne-Lena (Doctoral theses at NTNU;2017:135, Doctoral thesis, 2017)
      Wireless Sensor Networks (WSN) consists of sensor nodes equipped with radios for wireless communication. The overall goal of the sensor networks is to gather data. The terminal point for the data is usually a specific ...