Essays about: "Physical layer security"
Showing result 11 - 15 of 26 essays containing the words Physical layer security.
-
11. Channel-Based Intrusion Detection at the LTE Physical Layer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Long Term Evolution (LTE) is the most widespread cellular technology around the globe. An LTE device must communicate with base stations without encryption and authentication before a connection to a network is established and security steps executed. READ MORE
-
12. PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION
University essay fromAbstract : Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. READ MORE
-
13. Performance of physical layer security with different service integrity parameters
University essay fromAbstract : Information security has been a very important issue in wireless networks. With the ever-increasing amount of data being exchanged over wireless networks, the confidentiality of information needs to be protected from unauthorized users called eavesdropper. READ MORE
-
14. Sending Location-Based KeysUsing Visible Light Communication
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. READ MORE
-
15. On the security of TLS and IPsec : Mitigation through physical constraints
University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakultetenAbstract : TLS and IPsec are two protocols that provide secure communication on the Internet. They provide similar services but operate on different levels. This report compiles some of thecurrent known vulnerabilities that exist in those two protocols. It also describes attacks that exploit those vulnerabilities. READ MORE