Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure device to device communication
KTH, School of Electrical Engineering (EES), Communication Theory.
2014 (English)Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.

 This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.

 This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage.

Place, publisher, year, edition, pages
2014. , 58 p.
Series
EES Examensarbete / Master Thesis, XR-EE-KT 2014:006
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-146611OAI: oai:DiVA.org:kth-146611DiVA: diva2:724205
Educational program
Master of Science in Engineering - Microelectronics
Presentation
2014-06-09, Conference Room SIP, Osquldas väg 10 (Floor 3), Stockholm, 09:20 (English)
Supervisors
Examiners
Available from: 2014-07-14 Created: 2014-06-12 Last updated: 2014-07-14Bibliographically approved

Open Access in DiVA

Master_Thesis_NathalieS(927 kB)332 downloads
File information
File name FULLTEXT01.pdfFile size 927 kBChecksum SHA-512
ff6045acab156df0a0d985fe50990a8004fa8529b7e6392457cb3e849b9eb9836002679b63903f2737e795a8bf2bb542ce752a1646fcf39ecccdcce92ff20d46
Type fulltextMimetype application/pdf

By organisation
Communication Theory
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 332 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 361 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf