Essays about: "Physical layer security"

Showing result 1 - 5 of 17 essays containing the words Physical layer security.

  1. 1. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  2. 2. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE


    University essay from

    Author : Srihari Arolla; Naga Venkata Sai Teja Gurrala; [2018]
    Keywords : Physical Layer Security; Bit Error Rate; Key Error Rate; Pseudo Random Generator; Secret Key.;

    Abstract : Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. READ MORE

  4. 4. Performance of physical layer security with different service integrity parameters

    University essay from

    Author : Akhila Naga Sree Ravali Padala; Kavya Kommana; [2018]
    Keywords : Physical layer security; outage probability; symbol error rate; secrecy capacity;

    Abstract : Information security has been a very important issue in wireless networks. With the ever-increasing amount of data being exchanged over wireless networks, the confidentiality of information needs to be protected from unauthorized users called eavesdropper. READ MORE

  5. 5. Sending Location-Based KeysUsing Visible Light Communication

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Estuardo Rene Garcia Velasquez; [2016]
    Keywords : ;

    Abstract : In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. READ MORE