JDMCreator / LaTeXTableEditor

readme
MIT License
141 stars 14 forks source link

LaTeX table could not be loaded #55

Closed abdullahbm09 closed 2 years ago

abdullahbm09 commented 2 years ago
\begin{table}

\begin{tabular}{lll}

\caption{Summary of security mechanisms on network and transport layer}\\ 
\hline
\multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}\textbf{ Technology}\\\textbf{/Standard }\end{tabular}} & \multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}\textbf{Application}\\\textbf{/Bandwidth}\end{tabular}} & \multicolumn{1}{c}{\textbf{Security Mechanisms }} \endfirsthead 
\hline
\multicolumn{3}{c}{\textit{Capillary Network Communication Technologies}} \\ 
\hline
IrDA & \begin{tabular}[c]{@{}l@{}}Data\\transfer\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}No data link level security as the transmission of data is done without\\encryption, message integrity protection, and authorization\end{tabular}\end{tabular} \\ 
\hline
RFID & \begin{tabular}[c]{@{}l@{}}Inventory\\access\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}Data protection solution includes tag duplicate protection and password\\based or physical locking of tag memory\end{tabular}\\For privacy protection: faraday cage, tags' kill command, active jamming\end{tabular} \\ 
\hline
NFC & \begin{tabular}[c]{@{}l@{}}Access~\\control,\\payment\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}Security standard ECMA-385 for channel and service' security-based\\on ECMA International\end{tabular}\\ECDH and AES for data integrity and confidentiality\\256-bit ECDH key agreement for data authenticated encryption\\\begin{tabular}[c]{@{}l@{}}Asymmetric cryptography (ECMA-410) or symmetric cryptographic\\(ECMA-411) based mutual authentication\end{tabular}\end{tabular} \\ 
\hline
Bluetooth & \begin{tabular}[c]{@{}l@{}}Smart home,\\wireless apps,\\healthcare\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}Access control via symmetric link key\\Device authentication via shared-key response\\Use of SAFER+ algorithm for confidentiality\\128-bit AES counter mode CBC-MAC (AES-CCM)\end{tabular} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}Ultra-wideband\\(UWB) low\\power and\\high speed\\data\end{tabular} & \begin{tabular}[c]{@{}l@{}}Target\\detection and\\tracking,~\\automotive\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}Authentication via secure pairing\\\begin{tabular}[c]{@{}l@{}}Strong security properties due to its low average radiated power, high\\data rate, very low interference with traditional wireless technologies\end{tabular}\\Difficult to apply wireless network attacks e.g., reply and jamming attack\end{tabular} \\ 
\hline
HomePlug & \begin{tabular}[c]{@{}l@{}}Smart home~\\automation\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}Confidentiality, integrity, and authentication can be achieved with 128-bit\\AES encryption~\end{tabular}\end{tabular} \\ 
\hline
ZigBee & \begin{tabular}[c]{@{}l@{}}Smart~\\application\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}Physical and MAC layer employs IEEE 802.15.4 defined security services\\\begin{tabular}[c]{@{}l@{}}Additional security services at the network and application layer includes\\AES encryption standard (AES-CCM) and 128-bit keys~\end{tabular}\end{tabular} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}Wireless\\HART\end{tabular} & \begin{tabular}[c]{@{}l@{}}Industrial~\\monitoring and\\control\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}Confidentiality, integrity, and authentication are enforced via a set of \\security keys including network key and session key.~\end{tabular}\\\begin{tabular}[c]{@{}l@{}}Join key for device authentication and only support AES-128\\symmetric key only~\end{tabular}\end{tabular} \\ 
\hline
\multicolumn{3}{c}{\textit{Backhaul Network Communication Technologies }} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}802.3\\Ethernet\end{tabular} & \begin{tabular}[c]{@{}l@{}}10 Mbps to~\\10 Gbps\\shared\end{tabular} & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}\begin{tabular}[c]{@{}l@{}}IEEE 802.1.AE-2006 renders confidentiality, integrity, and access control\\on authorized systems using AES-128/AES-256 standards and Internet\\key exchange (IKE) v2 protocol\end{tabular}\\Port-based network access control specified by IEEE 802.1X-2010\end{tabular} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}802.11\\WLAN/Wi-Fi\end{tabular} & \begin{tabular}[c]{@{}l@{}}11-54 Mbps\\shared\end{tabular} & \begin{tabular}[c]{@{}l@{}}Ensure confidentiality, integrity, authentication, and access control via several\\security models such as:\\\\\begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}Wired equivalent privacy (WEP) with shared WEP keys~\\802.1X\\Wi-Fi protected access (WPA) for addressing caveats of WEP\\WP2 also knowns as 802.11i WPA~\end{tabular}\end{tabular} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}802.15.4\\LR-WPAN\end{tabular} & \begin{tabular}[c]{@{}l@{}}up to \\250 Kbit/s\end{tabular} & \begin{tabular}[c]{@{}l@{}}Different security suits exist for different security requirements as follows:\\\\\begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}AES-CTR, AES-CCM-64 for confidentiality and frame encryption\\AEES-CCM-32, AES-CCM-65, AES-CBC-MAC-32/64 for frame integrity\end{tabular}\end{tabular} \\ 
\hline
\begin{tabular}[c]{@{}l@{}}802.16~\\WiMax\end{tabular} & \begin{tabular}[c]{@{}l@{}}up to 70\\Mbps shared\end{tabular} & \begin{tabular}[c]{@{}l@{}}IEEE 80.16-2004, IEEE 802.16e-2005, IEEE 802.16-2009, and IEEE \\802.16j-2009 renders~confidentiality, integrity, authentication, and \\access control\end{tabular} \\ 
\hline
\multicolumn{3}{c}{\textit{Backbone Network and Communication Technologies}} \\ 
\hline
NB-IoT & \begin{tabular}[c]{@{}l@{}}Smart home,\\logistic and\\energy\end{tabular} & \begin{tabular}[c]{@{}l@{}}It has some LTE security features inherently and also use partial ciphering\\techniques to secure user data\end{tabular} \\ 
\hline
LoRaWAN & Smart cities & \begin{tabular}{@{\labelitemi\hspace{\dimexpr\labelsep+0.5\tabcolsep}}l@{}}128-bit AES CTR for confidentiality\\Message integrity code for integrity\\TCP/IP network security and device encryption for authentication\\Authorization and access control via Application layer~\end{tabular} \\ 
\hline
SigFox & Smart cities & \begin{tabular}[c]{@{}l@{}}Identification is ensured via distinct device ID and authentication via\\AES~encrypted signature\end{tabular} \\
\hline
\end{tabular}

\end{table}