نتایج جستجو برای: eavesdropper attack
تعداد نتایج: 81837 فیلتر نتایج به سال:
We propose a novel physical layer security scheme that exploits an optimization method as one-way function. The proposed builds on nonsquare differential multiple-input multiple-output (MIMO), which is capable of noncoherent detection even in massive MIMO scenarios and thus resilient against risky pilot insertion contamination attacks. In contrast to conventional schemes, require space-time pro...
All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can b...
Privacy and Security are major issue occur in IoT network. The main objective of the project was to eliminate the eavesdropper collusion occurred by the two or more devices communicating via optimal relay with centralized router using IOT network. To overall delay is reduced with increase in throughput. The security and privacy are some of the major issues that prevent the wide adoption of Inte...
The method of key sharing between a mobile unit and a base station through a wirelessMIMO-based fading channel is investigated. The expressions to estimate the correct keybit agreement based on a quantization with the use of guard interval are proved. Thegenerated key sequences are tested on pseudo randomness and improved by applicationof some transforms. It provides that these key sequences pa...
The crucial issue of quantum communication protocol is its security. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called pingpong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full in...
The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmiss...
In remote state estimation, data transmitted by a sensor through wireless communication channel may be overheard an eavesdropper. One possible way to avoid information leakage is encrypt the all time. However, this impose extra operation energy burden on sensor. paper, we investigate optimal encryption scheduling in order protect privacy and ensure estimation accuracy under constraint. Specific...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید