Difference between revisions of "Main Page"

From Physical Layer Security
Jump to: navigation, search
Line 5: Line 5:
 
After that we continue with the different Channels we are using. There are [[IEEE 802.11]], [[IEEE 802.15.4]],[[IEEE 802.11 CTF]]. You can find further details, by pressing the hyperlinks.  
 
After that we continue with the different Channels we are using. There are [[IEEE 802.11]], [[IEEE 802.15.4]],[[IEEE 802.11 CTF]]. You can find further details, by pressing the hyperlinks.  
 
The third part of our Wiki concerns the Attacks themselves. We will clairfy the [[Threats Against Environment-Dependent Security]]. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an [[Experimental Security Analysis]] where we present an experimentally-supported security analysis of the PHYSEC system.  
 
The third part of our Wiki concerns the Attacks themselves. We will clairfy the [[Threats Against Environment-Dependent Security]]. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an [[Experimental Security Analysis]] where we present an experimentally-supported security analysis of the PHYSEC system.  
 +
In the next step we get to the Security Analysie. The we lay our main focus on the quantization. We clarify the differences [[Quantization - Reliability versus Secrecy]], anlyse several protocolls in [[Quantization - Analysis of Protocols]] and lead in the [[Quantization - Real-World Evaluation]]. In the end we get over to the [[Entropy Estimation]].
 +
 +
The last chapter presents the Quantizer topic, which were discussed by [[Ambekar]], [[Aono]], [[Hamida]], [[Mathur]], [[Patwari]] and [[Wallace]].
 
   
 
   
  

Revision as of 10:04, 27 October 2017

Welcome to our PLS Wiki! This WIKI concerning Physical Layer Security! It is thought to combine the information about physical layer security and everything that belongs directly or indirtly to this topic.

To get in detail, this Wiki thematizes different parts. In the beginning of the Wiki one can find information about the Key Extraction Principles, the Radio Wave Propagation and the Channel Parameters. These pages define the background information, which are required to understand the later topic itself. After that we continue with the different Channels we are using. There are IEEE 802.11, IEEE 802.15.4,IEEE 802.11 CTF. You can find further details, by pressing the hyperlinks. The third part of our Wiki concerns the Attacks themselves. We will clairfy the Threats Against Environment-Dependent Security. To underline this topic we made an attack tree with the content that represents the attack vectors for specific adversarial goals. Further one can find an Experimental Security Analysis where we present an experimentally-supported security analysis of the PHYSEC system. In the next step we get to the Security Analysie. The we lay our main focus on the quantization. We clarify the differences Quantization - Reliability versus Secrecy, anlyse several protocolls in Quantization - Analysis of Protocols and lead in the Quantization - Real-World Evaluation. In the end we get over to the Entropy Estimation.

The last chapter presents the Quantizer topic, which were discussed by Ambekar, Aono, Hamida, Mathur, Patwari and Wallace.


severalConcerning our recently release paper here is a direct link to our testbed.

TestBed

For further questions please contact us. Your PhySec Team.