Essays about: "wireless security simulation"

Showing result 1 - 5 of 19 essays containing the words wireless security simulation.

  1. 1. Decode and Forward Relay Assisting Active Jamming in NOMA System

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lakshmikanth Akurathi; Surya Teja Reddy Chilluguri; [2022]
    Keywords : Physical Layer Security; Power-domain NOMA; Decode and Forward Relay; Jamming in NOMA; Nakagami-m Fading; Relay Transmission; Secrecy Performance.;

    Abstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE

  2. 2. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Sebastian Leclerc; Philip Kärrström; [2022]
    Keywords : RFID; NFC; CLONING ATTACK; ACCESS CONTROL SYSTEM; MIFARE;

    Abstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE

  3. 3. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  4. 4. Implementation of Visible Light communications For Indoor Applications

    University essay from Blekinge Tekniska Högskola

    Author : Nitish Nagabhairava; [2018]
    Keywords : OOK modulation scheme; MATLAB-Simulation; Light Emitting Diodes .;

    Abstract : In recent years there is growing research in optical wireless communication. This growing popularity isdue to several characteristics like such as large bandwidth that is also not having spectrum regulationsimposed, low cost and license-free operation. READ MORE

  5. 5. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Johannes Nilsson; Jameel Habbosh; [2018]
    Keywords : performance-constrained sensor nodes; out-of-band communications; pre key-exchange problem; smartphone-based transmitter; Technology and Engineering;

    Abstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE