The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spectrum sharing environment permits secondary users (SUs) to utilize radio spectrum of primary users (PUs) but creates cross-interference between SUs and PUs. Moreover, jamming signal is useful in improving information security by deliberately corrupting received signals at eavesdroppers. The current paper presents an analytical framework on communication reliability and information security, which...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
In this paper a physical layer transmission method based on the channel prediction and users quality-of-service(QoS) is proposed. The time-varying Rayleigh fading channel is predicted by back propagation neural network (BPNN), which will serve as judging whether the system secure transmission capacity is redundant. Then a scheme to choose the best physical layer security coding under the secure transmission...
Tire Pressure Monitoring Systems (TPMS) offer real-time diagnostics of the status of a vehicle's tires via a wireless communications link back to the vehicle. These links, which provide data, mandated by the NHTSA, generally possess low security/low privacy, leading to a demonstrated potential for spoofing attacks or tracking a person/vehicle through the unencrypted emission of the tire's unique identifier...
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to...
Chaotic modulation is a strong method of improving communication security. Analog and discrete chaotic systems are presented in actual literature. Due to the expanse of digital communication, discrete-time systems become more efficient and closer to actual technology. The present contribution presents a reliable design method for a discrete-time nonlinear emitter, based on an analogue prototype. The...
In the conventional directional modulation (DM) system without relay aiding, when the eavesdropper locates within the main-beam of the desired direction, it can intercept the confidential message from source Alice. In this paper, we propose a strategy to enhance physical-layer security of direction modulation in wireless transmission with the help of multi-relay cooperation. In this scenario, the...
In this paper, we propose a novel secure and privacy-preserving scheme for enhancing security in vehicular cloud based tasks announcement. The proposed scheme uses an efficient multiple receiver signcryption technique with proxy re-encryption in order to prevent the private information of the vehicles from being disclosed during task announcement. By integrating the proxy re-encryption algorithm with...
The existing secure transmission methods based on fountain codes require a quite dominant quality of the main channel. In this paper, we propose a novel feedback-based method for fountain code to achieve stronger security. In the binary erasure channel model, the legitimate user shares the decoding situation with transmitter via feedback messages. The transmitter updates the coding process based on...
The Gaussian fading channel is studied, in which the channel from the transmitter to the receiver is corrupted by a multiplicative fading coefficient H and an additive Gaussian random noise. It is assumed that the channel is experiencing block fading, and the transmitter does not know the channel state information (CSI). The receiver is assumed to have full knowledge of the CSI. If the channel state...
The digitalization of modern television broadcasts makes it possible to provide interactive content to consumers over the air. But the hitherto unsecured nature of such broadcasts combined with the ever-increasing complexity of Smart TV software have created an opportunity for attackers to strike at consumers. DVB has updated the relevant standard to allow broadcasters to secure their services against...
A telecommunication equipment and information technical equipment usually produce unintentional electromagnetic fields. Information from a video display unit could be reconstructed by intercepting such emissions at a distance. The testing methods and countermeasure methods have been discussed and those standardizations have been published at ITU-T SG5 WP2, and ITU-T K.115: Mitigation methods against...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
The problem of secure communication with the multi-antenna transmission in fading channel is an essential task. The fading channel is one of media for the eavesdropper to intercept when transmitting data. We investigate method for security in wireless communication. In particular, we focus on confidential transmission of pseudo-random location of subcarrier to increase security. This security method...
Racetrack memory (RM, also known as DWM (domain wall memory)) is an emerging memory technology that has many advantages such as low power, high density, and low access latency. Recent studies have shown that it is promising to architect RM as last level cache (LLC). Given that a RM track consists of m domains (for storing m bits data) and n access heads (1≤n<m), one RM access often requires multiple...
Thanks to its flexibility and programmable features, Software-Defined Networking (SDN) has been attracting more and more attention from the academia and the industry. Unfortunately, the fundamental characteristic of SDN that decouples control plane from data plane becomes a potential attack surface as well, which enables adversaries to fingerprint and attack the SDNs. Existing work showed the possibility...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.