Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Engineering

Wireless Device Authentication Techniques Using Physical-Layer Device Fingerprint, Peng Hao Nov 2015

Wireless Device Authentication Techniques Using Physical-Layer Device Fingerprint, Peng Hao

Electronic Thesis and Dissertation Repository

Due to the open nature of the radio signal propagation medium, wireless communication is inherently more vulnerable to various attacks than wired communication. Consequently, communication security is always one of the critical concerns in wireless networks. Given that the sophisticated adversaries may cover up their malicious behaviors through impersonation of legitimate devices, reliable wireless authentication is becoming indispensable to prevent such impersonation-based attacks through verification of the claimed identities of wireless devices.

Conventional wireless authentication is achieved above the physical layer using upper-layer identities and key-based cryptography. As a result, user authenticity can even be validated for the malicious attackers …


Secrecy Enhancement In Cooperative Relaying Systems, Elham Nosrati Oct 2015

Secrecy Enhancement In Cooperative Relaying Systems, Elham Nosrati

Electronic Thesis and Dissertation Repository

Cooperative communications is obviously an evolution in wireless networks due to its noticeable advantages such as increasing the coverage as well as combating fading and shadowing effects. However, the broadcast characteristic of a wireless medium which is exploited in cooperative communications leads to a variety of security vulnerabilities. As cooperative communication networks are globally expanded, they expose to security attacks and threats more than ever. Primarily, researchers have focused on upper layers of network architectures to meet the requirements for secure cooperative transmission while the upper-layer security solutions are incapable of combating a number of security threats, e.g., jamming attacks. …


On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu Oct 2015

On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu

Electronic Thesis and Dissertation Repository

As an alternative and appealing approach to providing information security in wireless communication systems, secret key generation at physical layer has demonstrated its potential in terms of efficiency and reliability over traditional cryptographic methods. Without the necessity of a management centre for key distribution or reliance on computational complexity, physical layer key generation protocols enable two wireless entities to extract identical and dynamic keys from the randomness of the wireless channels associated with them.

In this thesis, the reliability of secret key generation at the physical layer is examined in practical wireless channels with imperfect channel state information (CSI). Theoretical …


Analysis And Compensation Of Power Amplifier Distortions In Wireless Communication Systems, Sharath Manjunath Oct 2015

Analysis And Compensation Of Power Amplifier Distortions In Wireless Communication Systems, Sharath Manjunath

Electronic Thesis and Dissertation Repository

Wireless communication devices transmit message signals which should possess desirable power levels for quality transmission. Power amplifiers are devices in the wireless transmitters which increase the power of signals to the desired levels, but produce nonlinear distortions due to their saturation property, resulting in degradation of the quality of the transmitted signal. This thesis talks about the analysis and performance of communication systems in presence of power amplifier nonlinear distortions.

First, the thesis studies the effects of power amplifier nonlinear distortions on communication signals and proposes a simplified design for identification and compensation of the distortions at the receiver end …


Endoscopic Targeting Tasks Simulator: An Approach Using Game Engines, Shaun W. Carnegie Sep 2015

Endoscopic Targeting Tasks Simulator: An Approach Using Game Engines, Shaun W. Carnegie

Electronic Thesis and Dissertation Repository

The pervasiveness of simulators used in professions requiring the skilled control of expensive machinery such as is the case in the aviation, mining, construction, and naval industries raises an intriguing question about the relatively poor adoption within the field of medicine. Certain surgical procedures such as neuro-endoscopic and laparoscopic lend themselves well to the application of virtual reality based simulators. This is due to the innate ability to decom- pose these complex macro level procedures into a hierarchy of subtasks that can be modelled in a software simulator to augment existing teaching and training techniques.

The research in this thesis …


Elastic Highly Available Cloud Computing, Hassan Hawilo Aug 2015

Elastic Highly Available Cloud Computing, Hassan Hawilo

Electronic Thesis and Dissertation Repository

High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically …


Location Estimation In Wireless Communication Systems, Kejun Tong Aug 2015

Location Estimation In Wireless Communication Systems, Kejun Tong

Electronic Thesis and Dissertation Repository

Localization has become a key enabling technology in many emerging wireless applications and services. One of the most challenging problems in wireless localization technologies is that the performance is easily affected by the signal propagation environment. When the direct path between transmitter and receiver is obstructed, the signal measurement error for the localization process will increase significantly. Considering this problem, we first propose a novel algorithm which can automatically detect and remove the obstruction and improve the localization performance in complex environment. Besides the environmental dependency, the accuracy of target location estimation is highly sensitive to the positions of reference …


Exploitation Of Data Correlation And Performance Enhancement In Wireless Sensor Networks, Tianqi Yu Aug 2015

Exploitation Of Data Correlation And Performance Enhancement In Wireless Sensor Networks, Tianqi Yu

Electronic Thesis and Dissertation Repository

With the combination of wireless communications and embedded system, lots of progress has been made in the area of wireless sensor networks (WSNs). The networks have already been widely deployed, due to their self-organization capacity and low-cost advantage. However, there are still some technical challenges needed to be addressed. In the thesis, three algorithms are proposed in improving network energy efficiency, detecting data fault and reducing data redundancy.

The basic principle behind the proposed algorithms is correlation in the data collected by WSNs. The first sensor scheduling algorithm is based on the spatial correlation between neighbor sensor readings. Given the …


Non-Linear Chirp Spread Spectrum Communication Systems Of Binary Orthogonal Keying Mode, Quan Wang Jun 2015

Non-Linear Chirp Spread Spectrum Communication Systems Of Binary Orthogonal Keying Mode, Quan Wang

Electronic Thesis and Dissertation Repository

Chirp spread spectrum (CSS) is a suitable choice of modulation signals for wireless communications, due to its inherited advantages such as low transmission power, simplicity of implementation, good interference rejection capability. Linear chirps are common choices in practical CSS systems of binary orthogonal keying (BOK) mode. However, linear chirps generally require the time-bandwidth product of each chirp signal to be 60 sHz or more in order to achieve desirable orthogonality requirements. Thus, a BOK CSS system based on linear chirps has to occupy very wide bandwidth, which is a very precious resource for wireless communication. Clearly, the requirement on broad …


Novel Physical Layer Authentication Techniques For Secure Wireless Communications, Jiazi Liu Apr 2015

Novel Physical Layer Authentication Techniques For Secure Wireless Communications, Jiazi Liu

Electronic Thesis and Dissertation Repository

Due to the open nature of radio propagation, information security in wireless communications has been facing more challenges compared to its counterpart in wired networks. Authentication, defined as an important aspect of information security, is the process of verifying the identity of transmitters to prevent against spoofing attacks. Traditionally, secure wireless communications is achieved by relying solely upon higher layer cryptographic mechanisms. However, cryptographic approaches based on complex mathematical calculations are inefficient and vulnerable to various types of attacks. Recently, researchers have shown that the unique properties of wireless channels can be exploited for authentication enhancement by providing additional security …