
The Library
Data security for third generation telecommunication systems
Tools
Delivasilis, Dimitrios L. (2003) Data security for third generation telecommunication systems. PhD thesis, University of Warwick.
|
PDF
WRAP_Theses_Delivasilis_2003.pdf - Unspecified Version - Requires a PDF viewer. Download (6Mb) | Preview |
Official URL: http://webcat.warwick.ac.uk/record=b1750373~S15
Abstract
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and weaknesses, presented in the beginning of this thesis, indicates the need of employing human voice as an alternative security solution. Consequently the presentation of the state of the art biometric solutions and their applicability to the desired communication medium is more than necessary. However, the lack of previous involvement of human voice in an encryption method with successful results, constitute the core of this work. The majority of biometric applications aim to improve the confidence of the system to know whether a user is who he or she claims to be (authentication) and a few of them help the system in deciding his/her identity (identification). This novel method of encryption combines wireless communication (especially Third Generation mobile phones), data security, digital signal processing and smart cards. All these four different research areas have been covered theoretically in the beginning of this thesis. Thorough discussion of the fundamental principles governing each area results in identifying the strengths and weaknesses of these four core research elements and benefits the implementation stages of this work. Continuing with the thesis and proceeding to the second part, the theoretical analysis has been backed up by experimental development and testing. Every aspect of the novel research architecture has been transformed into a research algorithm. The performance of the algorithm, its cohesion and coupling has been closely investigated. The overall result of the research work accompanied with the algorithm’s strengths and weaknesses, future directions together with possible applicability of the research solution provide the epilogue of this scientific journey has been discussed.
Item Type: | Thesis (PhD) | ||||
---|---|---|---|---|---|
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering | ||||
Library of Congress Subject Headings (LCSH): | Computer security, Wireless communication systems, Mobile communication systems -- Security measures, Computer networks -- Security measures | ||||
Official Date: | October 2003 | ||||
Dates: |
|
||||
Institution: | University of Warwick | ||||
Theses Department: | Department of Engineering | ||||
Thesis Type: | PhD | ||||
Publication Status: | Unpublished | ||||
Supervisor(s)/Advisor: | Leeson, Mark S., 1963- , Green, Roger, 1951- | ||||
Extent: | vii, 198 leaves : illustrations | ||||
Language: | eng |
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year