BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Putting wireless signal security in a system security context - Wa
 de Trappe\, Rutgers University
DTSTART:20161021T130000Z
DTEND:20161021T140000Z
UID:TALK68004@talks.cam.ac.uk
CONTACT:Markus Kuhn
DESCRIPTION:The tetherless nature of wireless communications supports the 
 operation of many applications and “ecosystems”\, ranging from the day
 -to-day operation of a hospital to factory automation. Unfortunately\, at 
 this instant\, there are many signals in the wireless ether that have no s
 ecurity baked in and for which the security/privacy implications are dire.
   In many cases\, these wireless technologies are not even thought of by a
 n organization’s security administrators. We will examine several exampl
 es of wireless signals that are prevalent and leaking sensitive informatio
 n. Often\, once a security analyst is aware of these problems\, the soluti
 ons are simple\, while in many other cases these problems require new tech
 niques that complement higher-layer “cryptographic” tools—in short\,
  to secure the signals themselves. Towards this objective\, there has been
  interest recently in applying  the principles of information theory and s
 ignal processing to\ndevelop a suite of physical layer security mechanisms
 . Although the community has made progress in the theory of securing the p
 hysical layer\, there are many important issues that must be addressed if 
 physical layer\nsecurity is ever to be adopted by real and practical syste
 ms. In this talk\, we briefly review several different flavors of physical
  layer security\, and\nthen examine the major hurdles that need to be addr
 essed if physical layer security is to become adopted in practice. We will
  identify some philosophical questions related to how one places physical 
 layer security in\nthe context of a system’s security\, and outline oppo
 rtunities for applying physical layer security to real systems\, especiall
 y if we can overcome the\nchallenges we've outlined.
LOCATION:LT2\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
