Essays about: "Physical Layer Security"

Showing result 6 - 10 of 26 essays containing the words Physical Layer Security.

  1. 6. Decode and Forward Relay Assisting Active Jamming in NOMA System

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lakshmikanth Akurathi; Surya Teja Reddy Chilluguri; [2022]
    Keywords : Physical Layer Security; Power-domain NOMA; Decode and Forward Relay; Jamming in NOMA; Nakagami-m Fading; Relay Transmission; Secrecy Performance.;

    Abstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE

  2. 7. Technologies and Evaluation Metrics for On-Board Over the Air Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Aneysha Datta; [2022]
    Keywords : Wireless; Performance Metrics; WAVE; DMG; Intra-Vehicular Communication; BER; Simulink; Model-Based Design;

    Abstract : This project has been carried out at the Electronic Embedded Systems Architecture Department at Volvo Construction Equipment (VCE), Eskilstuna, Sweden. It forms the baseline for a stepwise systematic research initiative to convert wired technologies used for certain in-vehicle control and communication components to wireless technologies. READ MORE

  3. 8. Physical Layer Security With Active Jamming Using NOMA.

    University essay from Blekinge Tekniska Högskola

    Author : Mounika Polisetti; [2021]
    Keywords : Physical Layer security; secrecy capacity; eavesdropper; spectral efficiency; secure NOMA transmission;

    Abstract : This paper is persuaded to understand the physical layer security in wireless commu-nications utilizing NOMA (Non Orthogonal Multiple Access) concepts in the presence of an eavesdropper. Physical layer security maintains the confidentiality and secrecyof the system against eavesdroppers. READ MORE

  4. 9. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  5. 10. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE