Secure mm‐Wave communications with imperfect hardware and uncertain eavesdropper location
نویسندگان
چکیده
منابع مشابه
Secure Communications in OFDMA networks with active eavesdropper
In this paper, we formulate the resource allocation problem for secure communications in a single cell OFDMA network where a base station wants to communicate to the users which are spread over its coverage area while an adversary is present in the network. In our model, we assume that the adversary s an active attacker which is able to either eavesdrop on the information transmitted over the w...
متن کاملSecure distributed lossless compression with side information at the eavesdropper
This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocat...
متن کاملBreaking the Code: Hacking the Alpha Secure Communications Hardware Platform
This paper describes two hardware attacks implemented and tested on the Alpha secure communications platform. One of the attacks, Kill Switch, is a denial-of-service attack that prevents Alpha from functioning correctly after being triggered by a predetermined input sequence. Like a switch, an attacker can turn Kill Switch on and off at will, making detection more difficult and masking the sour...
متن کاملMulticast Transmissions in Directional mmWave Communications
Multicast transmissions have been widely analyzed in traditional networks as a way to improve spectrum efficiency when multiple users are interested in the same data. However, their application to mmWave communications has been studied only marginally so far. The goal of this paper is to partially fill this gap by investigating optimal and suboptimal multicast schemes for mmWave communications ...
متن کاملRandomized Asynchronous Consensus with Imperfect Communications
We introduce a novel hybrid failure model, which facilitates an accurate and detailed analysis of round-based synchronous, partially synchronous and asynchronous distributed algorithms under both process and link failures. Granting every process in the system up to send and receive link failures (with arbitrary faulty ones among those) in every round, without being considered faulty, we show th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Emerging Telecommunications Technologies
سال: 2020
ISSN: 2161-3915,2161-3915
DOI: 10.1002/ett.4016