COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Putting wireless signal security in a system security context
Putting wireless signal security in a system security contextAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Markus Kuhn. note unusual date The tetherless nature of wireless communications supports the operation of many applications and “ecosystems”, ranging from the day-to-day operation of a hospital to factory automation. Unfortunately, at this instant, there are many signals in the wireless ether that have no security baked in and for which the security/privacy implications are dire. In many cases, these wireless technologies are not even thought of by an organization’s security administrators. We will examine several examples of wireless signals that are prevalent and leaking sensitive information. Often, once a security analyst is aware of these problems, the solutions are simple, while in many other cases these problems require new techniques that complement higher-layer “cryptographic” tools—in short, to secure the signals themselves. Towards this objective, there has been interest recently in applying the principles of information theory and signal processing to develop a suite of physical layer security mechanisms. Although the community has made progress in the theory of securing the physical layer, there are many important issues that must be addressed if physical layer security is ever to be adopted by real and practical systems. In this talk, we briefly review several different flavors of physical layer security, and then examine the major hurdles that need to be addressed if physical layer security is to become adopted in practice. We will identify some philosophical questions related to how one places physical layer security in the context of a system’s security, and outline opportunities for applying physical layer security to real systems, especially if we can overcome the challenges we’ve outlined. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsFriday Morning Seminars, Dept of Veterinary Medicine Friends of the Sedgwick Museum LCHES Seminars on Human Evolution Mordell Lectures Office of Scholarly Communication Mongolia & Inner Asia Studies Unit Seminar SeriesOther talksEquations in groups Active Machine Learning: From Theory to Practice CANCELLED in solidarity with strike action: Permanent Sovereignty over Natural Resources and the Unsettling of Mainstream Narratives of International Legal History Faster C++ Aspects of adaptive Galerkin FE for stochastic direct and inverse problems Transcriptional control of pluripotent stem cell fate by the Nucleosome Remodelling and Deacetylation (NuRD) complex |