Search for dissertations about: "physical-layer attacks"
Showing result 1 - 5 of 8 swedish dissertations containing the words physical-layer attacks.
-
1. Performance Guarantees for Physical Layer Authentication in Mission-Critical Communications
Abstract : As the application areas for wireless communications are expanding, we also see new security vulnerabilities arise due to the open nature of the wire- less medium. One particularly challenging problem is how to guarantee the security of emerging mission-critical communications, e.g. READ MORE
-
2. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency
Abstract : The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. READ MORE
-
3. Physical Layer Security Issues in Massive MIMO and GNSS
Abstract : Wireless communication technology has evolved rapidly during the last 20 years. Nowadays, there are huge networks providing communication infrastructures to not only people but also to machines, such as unmanned air and ground vehicles, cars, household appliances and so on. READ MORE
-
4. Using Outage Probability to Tailor Communication Protocols Suitable for Cyber-Physical Systems Operating in Confined Areas
Abstract : Some types of Cyber-Physical System (CPS) applications found within e.g., quarrying, mining, harbors, and construction sites, operate within confined areas. READ MORE
-
5. Departure-Based Intrusion Detection
Abstract : Industrial Control Systems (ICS) combine information technology with operation technology to monitor or control physical industrial processes via computer-based programs and often operate on critical infrastructures. As such, compromised or maliciously operated ICS can cause devastating consequences on society at large. READ MORE