Essays about: "Physical layer authentication"

Showing result 1 - 5 of 6 essays containing the words Physical layer authentication.

  1. 1. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  2. 2. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE

  3. 3. Channel-Based Intrusion Detection at the LTE Physical Layer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bjarki Mar Benediktsson; [2019]
    Keywords : ;

    Abstract : Long Term Evolution (LTE) is the most widespread cellular technology around the globe. An LTE device must communicate with base stations without encryption and authentication before a connection to a network is established and security steps executed. READ MORE

  4. 4. Security in Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Yuanjun Song; [2013]
    Keywords : Internet of Things; IoT; security; addressing model; access model.;

    Abstract : The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics. READ MORE

  5. 5. Security analysis of the WiMAX technology in Wireless Mesh networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Md. Rezaul Karim Siddiqui; Sayed Mohammad Atiqur Rahman; [2009]
    Keywords : IEEE 802.16; WiMAX; Mesh mode; Mesh network; Vulnerability; Security threats ;

    Abstract : The IEEE 802.16 (WiMAX) is the promising technique to overcome some disadvantages on the Security concern of the widespread IEEE 802.11 standard. For providing high speed wide area broadband wireless access, WiMAX is an emerging wireless technology for creating multi-hop Mesh network. READ MORE