Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling Dec 2020

Protecting Health Data In A Pandemic: A Systematic Adversarial Threat Analysis Of Contact Tracing Apps, Leah Krehling

Electronic Thesis and Dissertation Repository

In this thesis centralized, decentralized, Bluetooth, and GPS based applications of digital contact tracing were reviewed and assessed. Using privacy principles created by a contingent of security and privacy experts from across Canada, a metric of assessing an application’s privacy was created. An attack tree was built to assess the security of the contact tracing applications. Eighteen attacks were theorized against contact tracing applications currently in use. An application’s vulnerability to the attacks was measured using a scoring system developed for this purpose. The results of the security scores were used to create a metric for assessing the security of …


On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu Oct 2015

On Enhancements Of Physical Layer Secret Key Generation And Its Application In Wireless Communication Systems, Kang Liu

Electronic Thesis and Dissertation Repository

As an alternative and appealing approach to providing information security in wireless communication systems, secret key generation at physical layer has demonstrated its potential in terms of efficiency and reliability over traditional cryptographic methods. Without the necessity of a management centre for key distribution or reliance on computational complexity, physical layer key generation protocols enable two wireless entities to extract identical and dynamic keys from the randomness of the wireless channels associated with them.

In this thesis, the reliability of secret key generation at the physical layer is examined in practical wireless channels with imperfect channel state information (CSI). Theoretical …


Enhancing Reliability In Passive Anti-Islanding Protection Schemes For Distribution Systems With Distributed Generation, Mohsen Sheikholeslamzadeh Sep 2012

Enhancing Reliability In Passive Anti-Islanding Protection Schemes For Distribution Systems With Distributed Generation, Mohsen Sheikholeslamzadeh

Electronic Thesis and Dissertation Repository

This thesis introduces a new approach to enhance the reliability of conventional passive anti-islanding protection scheme in distribution systems embedding distributed generation. This approach uses an Islanding-Dedicated System (IDS) per phase which will be logically combined with the conventional scheme, either in blocking or permissive modes. Each phase IDS is designed based on data mining techniques. The use of Artificial Neural Networks (ANNs) enables to reach higher accuracy and speed among other data mining techniques. The proposed scheme is trained and tested on a practical radial distribution system with six-1.67 MW Doubly-Fed Induction Generators (DFIG-DGs) wind turbines. Various scenarios of …


Security On Medical Wireless Sensor Networks, Eric D. Southern Aug 2012

Security On Medical Wireless Sensor Networks, Eric D. Southern

Electronic Thesis and Dissertation Repository

Wireless technology is fast becoming a very important tool for all aspects of communication. An area that lacks a strong implementation for wireless communication is the medical field. Wireless systems could be used by clinicians to be better able to diagnose and monitor patients. The reason behind the lack of adoption in healthcare is due to the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. The current methods of wireless authentication are investigated and an existing issue in mobile networks is described and solved with two novel solutions; one solution within …