نتایج جستجو برای: eavesdropper attack
تعداد نتایج: 81837 فیلتر نتایج به سال:
In this paper, we study the implementation of a secure key distribution system based on an ultra-long fiber laser with bi-directional erbium-doped amplifier. The resilience was tested against passive attacks from eavesdropper. A similarity observed in spectra for both configurations and no signature that would allow eavesdropper to obtain state during transitions.
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest i...
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a sch...
In this paper, we use the hardness of quantization over general lattices as the basis of developing a physical layer secrecy system. Assuming that the channel state observed by the legitimate receiver and the eavesdropper are distinct, this asymmetry is used to develop a cryptosystem that resembles the McEliece cryptosystem, designed to be implemented at the physical layer. We ensure that the l...
We consider the problem of finding secrecy rate of a multiple-input multiple-output (MIMO) wire-tap channel. A transmitter, a legitimate receiver, and an eavesdropper are all equipped with multiple antennas. The channel states from the transmitter to the legitimate user and to the eavesdropper are assumed to be known at the transmitter. In this contribution, we address the problem of finding th...
The inherent openness of wireless medium makes information security one of the most important and difficult problems in wireless networks. Physical layer security, which achieves the information-theoretic security by exploiting the differences between the physical properties of signal channels such that a degraded signal at an eavesdropper is always ensured and thus the original data can be har...
With the advent of quantum information, the violation of a Bell inequality is used to witness the absence of an eavesdropper in cryptographic scenarios such as key distribution and randomness expansion. One of the key assumptions of Bell's theorem is the existence of experimental "free will," meaning that measurement settings can be chosen at random and independently by each party. The relaxati...
We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-storage-space model postulates an eavesdropper who can execute arbitrarily complex computations, and is only limited in the total amount of storage space (not computation space) available to him. The bound on the storage space c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید