6 resultados para local security network

em Cochin University of Science


Relevância:

80.00% 80.00%

Publicador:

Resumo:

A novel compact wideband antenna for wireless local area network (WLAN) applications in the 2.4 GHz band are presented. The proposed low profile antenna of dimensions 15 x 14.5 x 1.6 mm offers 18.6% bandwidth and an average gain of~5 dBi. The antenna can be excited directly using a 50 coaxial probe

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A novel compact wideband antenna for wireless local area network (WLAN) applications in the 2.4 GHz band is presented. The proposed low profile antenna of dimensions 15 x 14.5 x 1.6 mm offers 18.6% bandwidth and an average gain of -5 dBi. The antenna can be excited directly using a 50 coaxial probe

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A compact ultra-wideband (UWB) printed slot antenna is described, suitable for integration with the printed circuit board (PCB) of a wireless, universal, serial-bus dongle. The design comprises of a near-rectangular slot fed by a coplanar waveguide (CPW) printed on a PCB of size 20 × 30 mm2. It has a large bandwidth covering the 3.1–10.6 GHz UWB band, with omnidirectional radiation patterns. Further, a notched band centered at 5.45 GHz wireless local area network bands is obtained within the wide bandwidth by inserting a narrow slot inside the tuning stub. Details of the antenna design are described, and the experimental results of the constructed prototype are presented. The time domain studies on the antenna shows a linear phase response throughout the band except at the notched frequency. The transient analysis of the antenna indicates very little pulse distortion confirming its suitability for high speed wireless connectivity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This work presents a wideband low-distortion sigmadelta analog-to-digital converter (ADC) for Wireless Local Area Network (WLAN) standard. The proposed converter makes use of low-distortion swing suppression SDM architecture which is highly suitable for low oversampling ratios to attain high linearity over a wide bandwidth. The modulator employs a 2-2 cascaded sigma-delta modulator with feedforward path with a single-bit quantizer in the first stage and 4-bit in the second stage. The modulator is designed in TSMC 0.18um CMOS technology and operates at 1.8V supply voltage. Simulation results show that, a peak SNDR of 57dB and a spurious free dynamic range (SFDR) of 66dB is obtained for a 10MHz signal bandwidth, and an oversampling ratio of 8.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.