Difference between revisions of "Main Page"

From Physical Layer Security
Jump to: navigation, search
Line 2: Line 2:
 
This WIKI concerning Physical Layer Security! This Wiki thematizes different parts. In the beginning of the Wiki one can find information about the [[Key Extraction Principles]], the [[Radio Wave Propagation]] and the [[Channel Parameters]]. These pages define the background information, which are required to understand the later topic itself.  
 
This WIKI concerning Physical Layer Security! This Wiki thematizes different parts. In the beginning of the Wiki one can find information about the [[Key Extraction Principles]], the [[Radio Wave Propagation]] and the [[Channel Parameters]]. These pages define the background information, which are required to understand the later topic itself.  
 
After that we continue with the different Channels we are using. There are [[IEEE 802.11]], [[IEEE 802.15.4]],[[IEEE 802.11 CTF]]. You can find further details, by pressing the hyperlinks.  
 
After that we continue with the different Channels we are using. There are [[IEEE 802.11]], [[IEEE 802.15.4]],[[IEEE 802.11 CTF]]. You can find further details, by pressing the hyperlinks.  
The third part of our Wiki concerns the Attacks themselves. We will clairfy the [[Threats Against Environment-Dependent Security]]. To underline this topic we made an attack tree with the content
+
The third part of our Wiki concerns the Attacks themselves. We will clairfy the [[Threats Against Environment-Dependent Security]]. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further
  
  

Revision as of 09:33, 27 October 2017

Welcome to our PLS Wiki! This WIKI concerning Physical Layer Security! This Wiki thematizes different parts. In the beginning of the Wiki one can find information about the Key Extraction Principles, the Radio Wave Propagation and the Channel Parameters. These pages define the background information, which are required to understand the later topic itself. After that we continue with the different Channels we are using. There are IEEE 802.11, IEEE 802.15.4,IEEE 802.11 CTF. You can find further details, by pressing the hyperlinks. The third part of our Wiki concerns the Attacks themselves. We will clairfy the Threats Against Environment-Dependent Security. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further


severalConcerning our recently release paper here is a direct link to our testbed.

TestBed

For further questions please contact us. Your PhySec Team.