Rehman, Saeed Sowerby, K.W. Alam, Shafiq
Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. This is in contrast to the traditional bit-level algorithmic approaches to securing transmissions. In this letter, we introdu...
Rehman, Saeed Alam, Shafiq Ardekani, Iman
Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. RF fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint...
Rehman, Saeed Sowerby, K.W. Alam, Shafiq Ardekani, Iman
In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer security is a new paradigm in which features extracted from an analog signal can be used to establish the unique identity of a tra...
Fourie, Leon Pang, Shaoning Kingston, Tamsin Hettema, Hinne Watters, Paul Sarrafzadeh, Hossein
Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including the US and New Zealand see this as a human capital crisis. This paper discusses the severity and various dimensions of this cri...
Sathu, Hira Komosny, Dan Singh, S.
Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized zones) can be virtualized in three different ways. In this paper, the level of security of these three virtualized DMZs wa...
Rehman, Saeed Sowerby, K.W. Coghill, Colin
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performa...
Treseangrat, Kiattikul
A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the victim network by sending a large number of IP packets to the targeted system. Since no single solution for a DDoS attack has been...
Rehman, Saeed Burki, Shafiq Ardekani, Iman
In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer security is a new paradigm in which features extracted from an analog signal can be used to establish the unique identity of a tr...
Rehman, Saeed Sowerby, K.W. Alam, Shafiq Ardekani, Iman
RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. This is in contrast to the traditional bit- level algorithmic approaches to securing transmissions. In this work, we presen...
Kaur, Navneet
Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own Cloud Computing approach. It is being widely adopted by IT organisations in the last few years. Since Cloud Computing is an emergi...