Essays about: "Physical layer security"

Showing result 1 - 5 of 16 essays containing the words Physical layer security.

  1. 1. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE

  2. 2. PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION

    University essay from

    Author : Srihari Arolla; Naga Venkata Sai Teja Gurrala; [2018]
    Keywords : Physical Layer Security; Bit Error Rate; Key Error Rate; Pseudo Random Generator; Secret Key.;

    Abstract : Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. READ MORE

  3. 3. Performance of physical layer security with different service integrity parameters

    University essay from

    Author : Akhila Naga Sree Ravali Padala; Kavya Kommana; [2018]
    Keywords : Physical layer security; outage probability; symbol error rate; secrecy capacity;

    Abstract : Information security has been a very important issue in wireless networks. With the ever-increasing amount of data being exchanged over wireless networks, the confidentiality of information needs to be protected from unauthorized users called eavesdropper. READ MORE

  4. 4. Sending Location-Based KeysUsing Visible Light Communication

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Estuardo Rene Garcia Velasquez; [2016]
    Keywords : ;

    Abstract : In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. READ MORE

  5. 5. On the security of TLS and IPsec : Mitigation through physical constraints

    University essay from Linköpings universitet/Institutionen för datavetenskapLinköpings universitet/Tekniska fakulteten

    Author : Erik Reimers; [2015]
    Keywords : TLS; Transport Layer Security; IPsec; vulnerabilities; attacks;

    Abstract : TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. READ MORE