Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Enhancing Secrecy Via Exploring Randomness In The Wireless Physical Layer, Rehan Talat Jan 2013

Enhancing Secrecy Via Exploring Randomness In The Wireless Physical Layer, Rehan Talat

Masters Theses 1911 - February 2014

In order to establish a secure connections in the wireless environment, cryptographic methods may require an exchange of a key or secret. Fortunately, the environment provides randomness due to multi-path fading that can be exploited by physical-layer security algorithms to help establish this shared secret. However, in some cases, multi-path fading might be absent or negligible; therefore, we look for artificial ways to increase randomness. In this thesis, we explore antenna radiation variation by altering the phase between two antennas as a means of creating artificial fading. We construct a model of the antenna gain variation by analyzing the radiation …


Secure And Energy Efficient Physical Unclonable Functions, Sudheendra Srivathsa Jan 2012

Secure And Energy Efficient Physical Unclonable Functions, Sudheendra Srivathsa

Masters Theses 1911 - February 2014

Physical Unclonable Functions are a unique class of circuits that leverage the inherentvariations in manufacturing process to create unique,unclonableIDs and secret keys.The distinguishing feature of PUFs is that even an untrusted foundry cannot create a copy of the circuit as it is impossible to control the manufacturing process variations.PUFs can operate reliably in presence of voltage and temperature variations. In thisthesis, weexplorethe security offered by PUFs and tradeoffs between different metrics such as uniqueness, reliability and energy consumption.Benefits of sub-threshold PUF operation and the use of delay based Arbiter PUFs and ring oscillator PUFs in low power applications is evaluated. …


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai Jan 2012

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique …


Wireless Physical-Layer Security Performance Of Uwb Systems, Miyong Ko Jan 2011

Wireless Physical-Layer Security Performance Of Uwb Systems, Miyong Ko

Masters Theses 1911 - February 2014

Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages transmitted over such a system are still encrypted with a powerful cipher to protect their secrecy. Our challenge is to find a solution to provide an additional level of security at the physical layer so that simple systems such as RFID tags with limited resources can be secure without using standard encryption. It has recently been suggested that the cryptographic security of the system can be enhanced by exploiting physical properties of UWB signals. With an eavesdropper …