Secrecy algorithms for wireless networks
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the application of wireless communication has been ubiquitous in our daily life, it is important to secure the wireless communication as a lot of data we transmitting by wireless is private or confidential....
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/59169 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-59169 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-591692023-03-03T20:43:38Z Secrecy algorithms for wireless networks Zhao, Fan A S Madhukumar School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering::Data::Coding and information theory The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the application of wireless communication has been ubiquitous in our daily life, it is important to secure the wireless communication as a lot of data we transmitting by wireless is private or confidential. Now the world is always using cryptography method to secure the data. But as it has the nature of using computational complexity, it can’t guarantee that the secrecy will be absolutely achieved, and what’s more, as computer’s computational power is increasing and prices are declining, the cost needed to break a cipher will become cheaper and cheaper. Wired Equivalent Privacy (WEP) is an example that used to be employed as an encryption method but now can be broken by some free software within 1 minute. In information theory, there are mathematical ways to increase the equivocation rate of eavesdropper of data it received, for the purpose to achieve wireless secrecy. Here we are trying to use a more practically method to explain the wireless secrecy, which is differences of bit error rates between honest receiver and eavesdropper. If bit error rates of the eavesdropper is much higher than the honest receiver, the data eavesdropper received is could be useless as there are too many errors while data the honest receiver received is useful. In such a case, wireless secrecy is achieved. In this project, the performance of Convolutional Catastrophic Code and Low Density Parity Check Code is tested with different modulation methods. Discussion on how the coding schemes could be used to achieve wireless secrecy by exploiting the physical channel advantage of the honest receiver than eavesdropper is made. At the end, we conclude that the Convolutional Catastrophic Code and Low Density Parity Check Code are good to help achieve the wireless secrecy. And in the future we can use some method to tune the performance to achieve our requirement on secrecy. Bachelor of Engineering (Computer Engineering) 2014-04-24T09:20:30Z 2014-04-24T09:20:30Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/59169 en Nanyang Technological University 41 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Data::Coding and information theory |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Data::Coding and information theory Zhao, Fan Secrecy algorithms for wireless networks |
description |
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the application of wireless communication has been ubiquitous in our daily life, it is important to secure the wireless communication as a lot of data we transmitting by wireless is private or confidential.
Now the world is always using cryptography method to secure the data. But as it has the nature of using computational complexity, it can’t guarantee that the secrecy will be absolutely achieved, and what’s more, as computer’s computational power is increasing and prices are declining, the cost needed to break a cipher will become cheaper and cheaper. Wired Equivalent Privacy (WEP) is an example that used to be employed as an encryption method but now can be broken by some free software within 1 minute.
In information theory, there are mathematical ways to increase the equivocation rate of eavesdropper of data it received, for the purpose to achieve wireless secrecy. Here we are trying to use a more practically method to explain the wireless secrecy, which is differences of bit error rates between honest receiver and eavesdropper. If bit error rates of the eavesdropper is much higher than the honest receiver, the data eavesdropper received is could be useless as there are too many errors while data the honest receiver received is useful. In such a case, wireless secrecy is achieved.
In this project, the performance of Convolutional Catastrophic Code and Low Density Parity Check Code is tested with different modulation methods. Discussion on how the coding schemes could be used to achieve wireless secrecy by exploiting the physical channel advantage of the honest receiver than eavesdropper is made.
At the end, we conclude that the Convolutional Catastrophic Code and Low Density Parity Check Code are good to help achieve the wireless secrecy. And in the future we can use some method to tune the performance to achieve our requirement on secrecy. |
author2 |
A S Madhukumar |
author_facet |
A S Madhukumar Zhao, Fan |
format |
Final Year Project |
author |
Zhao, Fan |
author_sort |
Zhao, Fan |
title |
Secrecy algorithms for wireless networks |
title_short |
Secrecy algorithms for wireless networks |
title_full |
Secrecy algorithms for wireless networks |
title_fullStr |
Secrecy algorithms for wireless networks |
title_full_unstemmed |
Secrecy algorithms for wireless networks |
title_sort |
secrecy algorithms for wireless networks |
publishDate |
2014 |
url |
http://hdl.handle.net/10356/59169 |
_version_ |
1759856514499084288 |