Master:Network and network security
by
|
Fredrik Kvist
|
Supervisor(s)
|
Knut Øvsthus, Josef Noll
|
Due date
|
2019/05/02
|
Status
|
Finished
|
Problem description:
|
"not decided yet"
|
Methods and Tools:
|
The tools and methods in this thesis are based on
- A set of scenario, describing the challenges
- A list of requirements being extracted from the scenarios
- A description and evaluation of technologies and tools being candidates for solutions
- A functional architecture/description of the envisaged system
- An implementation of the core concepts
- A demonstration of the solution
- An evaluation of the solution, including a critical review of the descisions taken earlier
- Conclusions
- References
|
Time schedule
|
The envisaged time schedule (for a long thesis/60 ECTS) is:
- T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shalle be finalized
- T0+2 months: create an initial page describing the scenario
- T0+3: Provide a list of technologies which you think are necessary for the thesis
- T0+4: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section
- T0+7: Provide a draft of section 2 (scenario) and 3 (technologies)
- T0+10: Establish a draft on what to implement/architecture
- T0+11: Set-up an implementation, testing and evaluation plan
- T0+15: Evaluate your solution based on a set of parameters, keep in mind there is no such thing as a free lunch
- T0+17: Deliver the thesis
|
Pre-Knowledge
|
This thesis includes a reasonable amount of programming. The envisaged thesis is based on radio communications, thus expects the user to have followed at least two radio-related courses
|
Approved
|
Pending by
|
Keywords
|
IoTSec, SCOTT
|
Depiction
|
|
this page was created by Special:FormEdit/Thesis, and can be edited by Special:FormEdit/Thesis/Master:Network and network security
The thesis is completed and has been delivered.