Simulador para cálculo de probabilidade de falha para redes cooperativas sem fio com restrições de sigilo
According with studies published at IEEE International Conference about Smart Grids, in 2011, it’s necessary update the power lines, making them a way to control and distribute energy. In this scenario – an example like many others applications that require secrecy during information communicatio...
Autor principal: | Schusrtz, Fábio César |
---|---|
Formato: | Trabalho de Conclusão de Curso (Graduação) |
Idioma: | Português |
Publicado em: |
Universidade Tecnológica Federal do Paraná
2020
|
Assuntos: | |
Acesso em linha: |
http://repositorio.utfpr.edu.br/jspui/handle/1/8140 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Resumo: |
According with studies published at IEEE International Conference about
Smart Grids, in 2011, it’s necessary update the power lines, making them a way
to control and distribute energy. In this scenario – an example like many others
applications that require secrecy during information communication – private
informations goes through the energy line, susceptible to unauthorized
eavesdropping and interferences, resulting in a necessity to protect the
information. The general goal of this paper is build a simulator able to calculate
the secrecy outage probability ina a cooperative wireless network with secrecy
restrictions. This project has three phases. First phase is the application
modeling and the graphic interface definition. The second phase is building the
runnable software code and the third phase are the tests and collecting data
from the execution of the application. The application will be modeled using
UML, developed in Java programing language and will show to the user a
wireless network topology, with two sources, one destination and one passive
eavesdropper node. The distances can change between nodes and for each
source is possible to watch a secrecy outage probability graph using direct
transmission, decode-and-forward and generalized dynamics network coding,
with and without a dumb eavesdropper knowing the network topology. As the
result, it is built an application capable of generating secrecy outage probability
graphs for each strategy that are expected by the theory, resting for future
works implement new communication strategies and ways to measure
performance. |
---|