The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities of the ciphers are analyzed against known-plaintext and chosen-plaintext attacks and are found to be secure. Randomization test was also conducted on these schemes and the results are presented. For the proof of concept, the schemes were implemented ...
This paper presents a novel physical-layer security approach to protect the information exchanged in...
In view of the future diffusion of quantum computers, many of the cryptographic systems currently in...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has cre...
Due to the broadcast and time-varying natures of wireless channels, traditional communication system...
Nowadays wireless sensor networks are becoming very important part in our daily life as it is adopt...
The use of wireless networks for communication has grown significantly in recent times, and continue...
Abstract: New communications paradigms such as wireless communications for handheld devices have inc...
This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing....
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
In contrast to the network security that relies on upper-layer encryption for the confidentiality an...
This study introduces a novel scientific foundation to manage security and reliability in resource s...
This report provides a comprehensive view on the need for physical layer security. The security of ...
Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far f...
This paper presents a novel physical-layer security approach to protect the information exchanged in...
In view of the future diffusion of quantum computers, many of the cryptographic systems currently in...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has cre...
Due to the broadcast and time-varying natures of wireless channels, traditional communication system...
Nowadays wireless sensor networks are becoming very important part in our daily life as it is adopt...
The use of wireless networks for communication has grown significantly in recent times, and continue...
Abstract: New communications paradigms such as wireless communications for handheld devices have inc...
This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing....
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
In contrast to the network security that relies on upper-layer encryption for the confidentiality an...
This study introduces a novel scientific foundation to manage security and reliability in resource s...
This report provides a comprehensive view on the need for physical layer security. The security of ...
Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far f...
This paper presents a novel physical-layer security approach to protect the information exchanged in...
In view of the future diffusion of quantum computers, many of the cryptographic systems currently in...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...