WIRELESS COMMUNICATION WITHOUT PRE-SHARED SECRETS USING SPREAD SPECTRUM TECHNIQUE

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Wireless Security Framework without Shared Secrets

This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non-repudiation and anonymity. Our framework is based on two physical primitives: collaborative jamming and spatial signature enforcement. Notably, it eschews the use of shared secrets, while providing a cryptosystem th...

متن کامل

Wireless Lan to Support Multimedia Communication Using Spread Spectrum Technology

Wireless LAN is currently enjoying rapid deployment in University departments, business offices, hospitals and homes. It becomes an inexpensive technology and allows multiple numbers of the households to simultaneously access the internet while roaming about the house. In the present work , the design and development of a wireless LAN is highlighted which utilizes direct sequence spread spectru...

متن کامل

A Low-Rate Wireless Spread-Spectrum Communication Technique using Linear Step FM Signal

A low data-rate communication technique using linear step frequency modulated (LSFM) signal is presented. When the carrier frequency offset (CFO) between the transmitter and the receiver is significant comparing to the symbol rate, the techniques using normal signaling waveforms with matched filtering become infeasible. In this scenario, wideband chirp (linear FM) signal is feasible because of ...

متن کامل

Jam Resistant Communications without Shared Secrets

Information security is only attained when all four of the classic information assurance goals confidentiality, integrity, authenticity, and availability – are attained. The work presented focuses exclusively on the availability goal; in particular, maintaining the availability of the physical layer link in an omnidirectional wireless communications system. Hostile jamming is a direct attack on...

متن کامل

Image Watermarking Using Spread Spectrum Technique

Abstract In this paper, we propose to embed the watermark information in the log-2-spatio domain by means of spread spectrum technique. In log-2-spatio domain, the variance of the information is reduced significantly. This improves the efficiency and robustness of spread spectrum technique. Low intensity and mid-band regions are selected to embed the information in order to guarantee an invisib...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2015

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2015.0412031