Change search
ReferencesLink to record
Permanent link

Direct link
Secure device to device communication
KTH, School of Electrical Engineering (EES), Communication Theory.
2014 (English)Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.

 This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.

 This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage.

Place, publisher, year, edition, pages
2014. , 58 p.
EES Examensarbete / Master Thesis, XR-EE-KT 2014:006
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
URN: urn:nbn:se:kth:diva-146611OAI: diva2:724205
Educational program
Master of Science in Engineering - Microelectronics
2014-06-09, Conference Room SIP, Osquldas väg 10 (Floor 3), Stockholm, 09:20 (English)
Available from: 2014-07-14 Created: 2014-06-12 Last updated: 2014-07-14Bibliographically approved

Open Access in DiVA

Master_Thesis_NathalieS(927 kB)219 downloads
File information
File name FULLTEXT01.pdfFile size 927 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Communication Theory
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 219 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 289 hits
ReferencesLink to record
Permanent link

Direct link