|(17 intermediate revisions by 2 users not shown)|
|−|<strong>MediaWiki has been installed. </strong> |+|
| || |
|−|Consult the [//meta. wikimedia.org/wiki/Help:Contents User' s Guide] for information on using the wiki software. |+|
| || |
|−|== Getting started == |+|
|−|* [//www. mediawiki. org/ wiki/ Special:MyLanguage/ Manual:Configuration_settings Configuration settings list] |+|
|−|* [ //www. mediawiki. org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ] |+|
|−|* [ https://lists. wikimedia. org/mailman/listinfo/mediawiki- announce MediaWiki release mailing list] |+|
|−|* [ //www. mediawiki. org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language] |+|
|−|* [//www. mediawiki. org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki] |+|
Latest revision as of 12:53, 2 November 2017
Welcome to our PLS Wiki!
This WIKI concerning Physical Layer Security! It is thought to combine the information about physical layer security and everything that belongs directly or indirtly to this topic.
The new paper!
Due to the release of our new paper, we continue with the regular content below and want to introduce the current topic of our Testbed at this position. Further information can be found here: Testbed. Further details about the current paper can be found here: Implementing a Real-Time Capable WPLS Testbed for Independent Performance and Security Analyses
The PLS Wiki
To get in detail, this Wiki thematizes different parts. In the beginning of the Wiki one can find information about the Key Extraction Principles, the Radio Wave Propagation and the Channel Parameters. These pages define the background information, which are required to understand the later topic itself.
After that we continue with the different Channels we are using. There are IEEE 802.11, IEEE 802.15.4,IEEE 802.11 CTF. You can find further details, by pressing the hyperlinks.
The third part of our Wiki concerns the Attacks themselves. We will clairfy the Threats Against Environment-Dependent Security. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an Experimental Security Analysis where we present an experimentally-supported security analysis of the PHYSEC system.
In the next step we get to the Security Analysie. The we lay our main focus on the quantization. We clarify the differences Quantization - Reliability versus Secrecy, anlyse several protocolls in Quantization - Analysis of Protocols and lead in the Quantization - Real-World Evaluation. In the end we get over to the Entropy Estimation.
The last chapter presents the Quantizer topic, which were discussed by Ambekar, Aono, Hamida, Mathur, Patwari and Wallace.
Questions and more
For further questions please contact us. Your PhySec Team. Contact Details can be found on
The PHYSEC WEBSITE