Difference between revisions of "Main Page"

From Physical Layer Security
Jump to: navigation, search
 
(16 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<div id="mainpage">
+
[[File:Bannerrub.png|1050px||center|Banner PLS WIKI ]]
{| style="border-collapse:collapse; width:100%;"
 
| colspan="2" style="padding:0;" |
 
  
<!-- Willkommen -->
+
Welcome to our PLS Wiki!
<div id="mainpagewelcome" class="hauptseite-oben">
+
This WIKI concerning Physical Layer Security! It is thought to combine the information about physical layer security and everything that belongs directly or indirtly to this topic.  
== Welcome to PLS Wiki ==
+
=='''''The new paper!''''' ==
<div class="inhalt" style="text-align:left;">
 
the research oriented knowledgebase about wireless physical-layer security and physical-layer security in general.
 
Working together with you and other international researchers, we hopefully can create an highly informative database, which pools international scientific research.  We will provide summaries of different theoretical attack scenarios and, if already performed, information about the evaluation in an ideal and/or realistic environment.
 
  
An overview of conceivable attacks can be modeled in an attack tree, which was introduced by Bruce Schneier in 1999.  
+
Due to the release of our new paper, we continue with the regular content below and want to introduce the current topic of our '''[[Testbed]]''' at this position. Further information can be found here: [[Testbed]]. Further details about the current paper can be found here: [https://www.emsec.rub.de/research/publications/implementing-real-time-capable-wpls-testbed-indepe/ Im­ple­men­ting a Re­al-Ti­me Ca­pa­ble WPLS Test­bed for In­de­pen­dent Per­for­mance and Se­cu­ri­ty Ana­ly­ses]
<div style="text-align:center;">
 
[[File:Attacktree.png|1000px]]
 
  
  
</div>
+
==The PLS Wiki==
 +
To get in detail, this Wiki thematizes different parts. In the beginning of the Wiki one can find information about the [[Key Extraction Principles]], the [[Radio Wave Propagation]] and the [[Channel Parameters]]. These pages define the background information, which are required to understand the later topic itself.
 +
After that we continue with the different Channels we are using. There are [[IEEE 802.11]], [[IEEE 802.15.4]],[[IEEE 802.11 CTF]]. You can find further details, by pressing the hyperlinks.
 +
The third part of our Wiki concerns the Attacks themselves. We will clairfy the [[Threats Against Environment-Dependent Security]]. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an [[Experimental Security Analysis]] where we present an experimentally-supported security analysis of the PHYSEC system.
 +
In the next step we get to the Security Analysie. The we lay our main focus on the quantization. We clarify the differences [[Quantization - Reliability versus Secrecy]], anlyse several protocolls in [[Quantization - Analysis of Protocols]] and lead in the [[Quantization - Real-World Evaluation]]. In the end we get over to the [[Entropy Estimation]].
  
 +
The last chapter presents the Quantizer topic, which were discussed by [[Ambekar]], [[Aono]], [[Hamida]], [[Mathur]], [[Patwari]] and [[Wallace]].
  
|-
+
==Questions and more==
| style="padding:0; vertical-align:top; width:50%;" |
 
  
<!-- Primary Artikles concerning the topic -->
+
For further questions please contact us. Your PhySec Team. Contact Details can be found on
<div id="hauptseite-primary" class="hauptseite-links">
+
[http://www.physec.de The PHYSEC WEBSITE]
== Basic Knowledge ==
 
    <div class="inhalt" id="mf-tfa" title="Primäre Artikel">
 
   
 
    </div>
 
At this position there will be a table of links concerning the essentials of PLS. Further details can be found as well in the links on the particular pages as with the usage of the search function
 
</div>
 
 
 
 
 
 
 
| style="padding:0; vertical-align:top; width:50%;" |
 
 
 
<!-- Aktuelle artikel  -->
 
<div id="hauptseite-content" class="hauptseite-rechts">
 
== Table of Content  ==
 
<div class="content" id="mf-itn" title="Table of Content">
 
[[Key Extraction Principles]]
 
 
 
[[Recovery Attack on Channel Correlation Information]]
 
 
 
[[Attacks on Quantization]]
 
 
 
[[Attacks on Key Reconciliation]]
 
 
 
[[Attacks on Privacy Amplification]]
 
 
 
[[Syndrome Decoding]]
 
 
 
</div>
 
 
 
 
 
 
 
|-
 
| colspan="2" style="padding:0;" |
 
 
 
 
 
|}
 
 
 
 
 
</div>
 
[[Kategorie:Wikipedia:Hauptseite| ]] <!-- Wird über einen Eintrag in der common.css ausgeblendet -->
 

Latest revision as of 12:53, 2 November 2017

Banner PLS WIKI

Welcome to our PLS Wiki! This WIKI concerning Physical Layer Security! It is thought to combine the information about physical layer security and everything that belongs directly or indirtly to this topic.

The new paper!

Due to the release of our new paper, we continue with the regular content below and want to introduce the current topic of our Testbed at this position. Further information can be found here: Testbed. Further details about the current paper can be found here: Im­ple­men­ting a Re­al-Ti­me Ca­pa­ble WPLS Test­bed for In­de­pen­dent Per­for­mance and Se­cu­ri­ty Ana­ly­ses


The PLS Wiki

To get in detail, this Wiki thematizes different parts. In the beginning of the Wiki one can find information about the Key Extraction Principles, the Radio Wave Propagation and the Channel Parameters. These pages define the background information, which are required to understand the later topic itself. After that we continue with the different Channels we are using. There are IEEE 802.11, IEEE 802.15.4,IEEE 802.11 CTF. You can find further details, by pressing the hyperlinks. The third part of our Wiki concerns the Attacks themselves. We will clairfy the Threats Against Environment-Dependent Security. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an Experimental Security Analysis where we present an experimentally-supported security analysis of the PHYSEC system. In the next step we get to the Security Analysie. The we lay our main focus on the quantization. We clarify the differences Quantization - Reliability versus Secrecy, anlyse several protocolls in Quantization - Analysis of Protocols and lead in the Quantization - Real-World Evaluation. In the end we get over to the Entropy Estimation.

The last chapter presents the Quantizer topic, which were discussed by Ambekar, Aono, Hamida, Mathur, Patwari and Wallace.

Questions and more

For further questions please contact us. Your PhySec Team. Contact Details can be found on The PHYSEC WEBSITE