Simulador para cálculo de probabilidade de falha para redes cooperativas sem fio com restrições de sigilo

According with studies published at IEEE International Conference about Smart Grids, in 2011, it’s necessary update the power lines, making them a way to control and distribute energy. In this scenario – an example like many others applications that require secrecy during information communicatio...

ver descrição completa

Autor principal: Schusrtz, Fábio César
Formato: Trabalho de Conclusão de Curso (Graduação)
Idioma: Português
Publicado em: Universidade Tecnológica Federal do Paraná 2020
Assuntos:
Acesso em linha: http://repositorio.utfpr.edu.br/jspui/handle/1/8140
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
Resumo: According with studies published at IEEE International Conference about Smart Grids, in 2011, it’s necessary update the power lines, making them a way to control and distribute energy. In this scenario – an example like many others applications that require secrecy during information communication – private informations goes through the energy line, susceptible to unauthorized eavesdropping and interferences, resulting in a necessity to protect the information. The general goal of this paper is build a simulator able to calculate the secrecy outage probability ina a cooperative wireless network with secrecy restrictions. This project has three phases. First phase is the application modeling and the graphic interface definition. The second phase is building the runnable software code and the third phase are the tests and collecting data from the execution of the application. The application will be modeled using UML, developed in Java programing language and will show to the user a wireless network topology, with two sources, one destination and one passive eavesdropper node. The distances can change between nodes and for each source is possible to watch a secrecy outage probability graph using direct transmission, decode-and-forward and generalized dynamics network coding, with and without a dumb eavesdropper knowing the network topology. As the result, it is built an application capable of generating secrecy outage probability graphs for each strategy that are expected by the theory, resting for future works implement new communication strategies and ways to measure performance.