Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

Electronic Thesis and Dissertation Repository

Theses/Dissertations

Security

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Engineering

On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu Oct 2015

On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu

Electronic Thesis and Dissertation Repository

As an alternative and appealing approach to providing information security in wireless communication systems, secret key generation at physical layer has demonstrated its potential in terms of efficiency and reliability over traditional cryptographic methods. Without the necessity of a management centre for key distribution or reliance on computational complexity, physical layer key generation protocols enable two wireless entities to extract identical and dynamic keys from the randomness of the wireless channels associated with them.

In this thesis, the reliability of secret key generation at the physical layer is examined in practical wireless channels with imperfect channel state information (CSI). Theoretical …


Security On Medical Wireless Sensor Networks, Eric D. Southern Aug 2012

Security On Medical Wireless Sensor Networks, Eric D. Southern

Electronic Thesis and Dissertation Repository

Wireless technology is fast becoming a very important tool for all aspects of communication. An area that lacks a strong implementation for wireless communication is the medical field. Wireless systems could be used by clinicians to be better able to diagnose and monitor patients. The reason behind the lack of adoption in healthcare is due to the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. The current methods of wireless authentication are investigated and an existing issue in mobile networks is described and solved with two novel solutions; one solution within …