Current Search: Telecommunication -- Security measures (x)
View All Items
- Title
- Intrusion detection in wireless networks: A data mining approach.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for...
Show moreThe security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for wireless networks; extracting features or metrics, from a security point of view, for modeling network traffic in a WLAN; and proposing a data mining-based approach to intrusion detection in WLANs. A clustering- and expert-based approach to intrusion detection in a wireless network is presented in this thesis. The case study data is obtained from a real-word WLAN and contains over one million records. Given the clusters of network traffic records, a distance-based heuristic measure is proposed for labeling clusters as either normal or intrusive. The empirical results demonstrate the promise of the proposed approach, laying the groundwork for a clustering-based framework for intrusion detection in computer networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13246
- Subject Headings
- Wireless communication systems, Data warehousing, Data mining, Telecommunication--Security measures, Computer networks--Security measures, Computer security
- Format
- Document (PDF)
- Title
- A Biometrics Based Secure Communication Scheme for Bluetooth Environment.
- Creator
- Soni, Puneet, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed....
Show moreA novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed. These extracted feature data, unlike traditional systems which include the extracted data into payload, is used for device connection by generating the 128 bit PIN. The system performance is analyzed using the pairing PIN for inter-sample and intra-sample recognition. To validate the stability of the system the performance is analyzed with external samples which are not a part of the internal database.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012556
- Subject Headings
- Bluetooth technology--Security measures, Network performance (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- Physical Layer Security of Wireless Transmissions Over Fading Channels.
- Creator
- Blanc, Sadrac, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the...
Show moreThe open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the presence of an eavesdropper. We investigate the performance of the wireless network at the physical layer that is subject to a variety of fading environments that may be modeled by the Rayleigh, Nakagami-m, and Generalized-K distributions, to mention a few. We use the secrecy outage probability (SOP) as the standard performance metrics to study the performance of the wireless networks. We propose two different approaches to compute the secrecy outage probability, and derive explicit expressions for the secrecy outage probability that allow us to characterize the performance of the wireless networks. Specifically, we use a direct integration approach as well as a Taylor series base approach to evaluate the secrecy outage probability. Finally, we use computer simulations, based on MATLAB, to confirm the analytical results.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004729, http://purl.flvc.org/fau/fd/FA00004729
- Subject Headings
- Data encryption (Computer science), Digital communications -- Reliability -- Mathematics, Internetworking (Telecommunication), Radio wave propagation, Wireless communication systems -- Security measures
- Format
- Document (PDF)
- Title
- Efficient implementation of zero-knowledge based identification protocols.
- Creator
- Barella, Michelle Elizabeth., Florida Atlantic University, Mullin, Ronald C.
- Abstract/Description
-
A zero knowledge identification protocol is an interactive proof system that allows a person to prove that he knows a secret key associated with his identity without revealing the secret key. This type of protocol is the topic of a fairy tale, by Gustavus Simmons called the King's Dilemma, about a king and the problem he has with thieves impersonating his tax collectors. It describes a zero-knowledge identification protocol that will rid the king of his problem. I present this system, the...
Show moreA zero knowledge identification protocol is an interactive proof system that allows a person to prove that he knows a secret key associated with his identity without revealing the secret key. This type of protocol is the topic of a fairy tale, by Gustavus Simmons called the King's Dilemma, about a king and the problem he has with thieves impersonating his tax collectors. It describes a zero-knowledge identification protocol that will rid the king of his problem. I present this system, the motivation for this thesis, and the transformations from this protocol, that uses lead weights and containers, to protocols that use mathematical elements. The security of these protocols is determined by the complexity of the underlying mathematical problem, such as the knapsack and discrete logarithm problem, and three properties: completeness, soundness, and zero knowledge.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13181
- Subject Headings
- Cryptography, Telecommunication systems--Security measures, Knapsack problem (Mathematics), Mathematical optimization, Finite fields (Algebra), Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- Universal physical access control system (UPACS).
- Creator
- Carryl, Clyde, Alhalabi, Bassem A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses the need for increased interoperability between the varied access control systems in use today, and for a secure means of providing access to remote physical devices over untrusted networks. The Universal Physical Access Control System (UPACS) is an encryption-enabled security protocol that provides a standard customizable device control mechanism that can be used to control the behavior of a wide variety of physical devices, and provide users the ability to securely...
Show moreThis research addresses the need for increased interoperability between the varied access control systems in use today, and for a secure means of providing access to remote physical devices over untrusted networks. The Universal Physical Access Control System (UPACS) is an encryption-enabled security protocol that provides a standard customizable device control mechanism that can be used to control the behavior of a wide variety of physical devices, and provide users the ability to securely access those physical devices over untrusted networks.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004354, http://purl.flvc.org/fau/fd/FA00004354
- Subject Headings
- Body area networks (Electronics), Computational complexity, Computer network protocols, Computer security, Cryptography, Data encryption (Computer science), Data structures (Computer science), Telecommunication -- Security measures
- Format
- Document (PDF)