Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Theses/Dissertations

Louisiana State University

Security

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Smart Access Control System With Behavioral Profiling And Dynamic Pin Concept, Lohit Penubaku Jan 2011

Smart Access Control System With Behavioral Profiling And Dynamic Pin Concept, Lohit Penubaku

LSU Master's Theses

Since ancient time, an access control device has been used for securing valuable properties as well as lives from threatening peoples. The most representative security device is Lock/Key. Recently, those security device technologies have been improved tremendously and provided various types of security methods. Nevertheless, these methods are not individually perfect to provide optimal security so that in recent years many such methods have been combined and used together to provide the required level of security. However, such combination can enhance security for limited number of users only but very difficult to provide scalable security with the number of users …


Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla Jan 2009

Secure Distributed Detection In Wireless Sensor Networks Via Encryption Of Sensor Decisions, Venkata Sriram Siddhardh Nadendla

LSU Master's Theses

We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the outputs are encrypted using a probabilistic cipher. The third party (enemy) fusion centers are unaware of the presence of the probabilistic encipher. We find the optimal (minimum-probability-of-error) fusion rule for the ally (friendly) fusion center subject to a lower bound on the the probability of error for the third-party fusion centers. To obtain the minimum probability of error, we first prove the quasi-convexity of error probability with respect to the sensor's threshold for a given …


Physical Layer Secrecy Channel Coding, Bandali K. Akkawi Jan 2008

Physical Layer Secrecy Channel Coding, Bandali K. Akkawi

LSU Master's Theses

Wireless communications is expanding and becoming an indispensable part of our daily life. However, due to its channel open nature, it is more vulnerable to attacks, such as eavesdropping and jamming which jeopardize the confidentiality of wireless data, compared to its counter-part, wireline communications. Security in wireless communication is thus a very important factor that should be perfected to accommodate the rapid growth of wireless communication today. Motivated by information theoretic secrecy definitions, we adopt a simple way to define the secrecy of a system by looking at its Bit-Error-Rate (BER) curves, the correlation of error vectors and Log Likelihood …