Wireless LAN location-sensing for security applications

Author(s):  
Ping Tao ◽  
Algis Rudys ◽  
Andrew M. Ladd ◽  
Dan S. Wallach
2010 ◽  
Author(s):  
Laurel A. McNall ◽  
Jeffrey M. Stanton
Keyword(s):  

2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

2010 ◽  
Vol E93-B (5) ◽  
pp. 1151-1154
Author(s):  
Jihoon LEE ◽  
Seungwoo JEON ◽  
Jaehoon KIM

2011 ◽  
Vol E94-B (5) ◽  
pp. 1463-1466
Author(s):  
Sai-Wing LEUNG ◽  
Kwok-Hung CHAN ◽  
Chi-Kit TANG

2020 ◽  
Vol E103.B (8) ◽  
pp. 860-871
Author(s):  
Rui TENG ◽  
Kazuto YANO ◽  
Yoshinori SUZUKI

Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document