Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Southern Methodist University

Signal Processing

Computer Engineering

Articles 1 - 3 of 3

Full-Text Articles in Engineering

In Band Full Duplex For Wireless Communication, A Medium Access Control Perspective, Yazeed Alkhrijah Dec 2022

In Band Full Duplex For Wireless Communication, A Medium Access Control Perspective, Yazeed Alkhrijah

Electrical Engineering Theses and Dissertations

In-band full duplex (IBFD) for wireless communication is defined as the ability of a node to send and receive data simultaneously by using the same frequency band. IBFD has the potential to double the spectral efficiency of wireless networks. In addition, IBFD improves security by mystifying any eavesdropper with multiple transmitted signals in a single frequency. Also, IBFD reduces the end-to-end transmission delay and solves the hidden terminal and exposed terminal problems. However, IBFD suffers from self-interference. Canceling self-interference (SI) is the main challenge in enabling IBFD. Another challenge for IBFD is to manage access to the network. IEEE802.11 are …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan Oct 2018

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …