Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Arkansas, Fayetteville

2008

Articles 1 - 1 of 1

Full-Text Articles in Information Security

An Efficient Hardware Implementation Of Target Recognition Algorithms And Investigation Of Secure Wireless Communication For A Modified Manet, Stephen Barnes May 2008

An Efficient Hardware Implementation Of Target Recognition Algorithms And Investigation Of Secure Wireless Communication For A Modified Manet, Stephen Barnes

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper presents a scheme for effective wireless security of a open broadcast mobile ad-hoc network, MANET, network without significant loss of bandwidth and data integrity through a double tiered encryption scheme, and the feasibility of reducing the target tracking algorithm in [1] into a compact and efficient hardware package. Due to the open nature of MANET, modifications are necessary to secure wireless data in a potential hostile environment. Furthermore, due to power and processing limitations of small unmanned aerial vehicles (UAVs) and the processing intensive calculations of image processing, a sample hardware implementation of key functions of the target …