Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Smart Access Control System With Behavioral Profiling And Dynamic Pin Concept, Lohit Penubaku
Smart Access Control System With Behavioral Profiling And Dynamic Pin Concept, Lohit Penubaku
LSU Master's Theses
Since ancient time, an access control device has been used for securing valuable properties as well as lives from threatening peoples. The most representative security device is Lock/Key. Recently, those security device technologies have been improved tremendously and provided various types of security methods. Nevertheless, these methods are not individually perfect to provide optimal security so that in recent years many such methods have been combined and used together to provide the required level of security. However, such combination can enhance security for limited number of users only but very difficult to provide scalable security with the number of users …
Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla
Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla
LSU Master's Theses
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the outputs are encrypted using a probabilistic cipher. The third party (enemy) fusion centers are unaware of the presence of the probabilistic encipher. We find the optimal (minimum-probability-of-error) fusion rule for the ally (friendly) fusion center subject to a lower bound on the the probability of error for the third-party fusion centers. To obtain the minimum probability of error, we first prove the quasi-convexity of error probability with respect to the sensor's threshold for a given …
Physical Layer Secrecy Channel Coding, Bandali K. Akkawi
Physical Layer Secrecy Channel Coding, Bandali K. Akkawi
LSU Master's Theses
Wireless communications is expanding and becoming an indispensable part of our daily life. However, due to its channel open nature, it is more vulnerable to attacks, such as eavesdropping and jamming which jeopardize the confidentiality of wireless data, compared to its counter-part, wireline communications. Security in wireless communication is thus a very important factor that should be perfected to accommodate the rapid growth of wireless communication today. Motivated by information theoretic secrecy definitions, we adopt a simple way to define the secrecy of a system by looking at its Bit-Error-Rate (BER) curves, the correlation of error vectors and Log Likelihood …