نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

1997
Eli Biham

Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed state, and we find...

Journal: :EURASIP J. Adv. Sig. Proc. 2013
Jia Zhu

In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission,...

Journal: :Wireless Communications and Mobile Computing 2022

In this paper, we investigate an innovative physical layer security (PLS) scheme for uncertain reconfigurable intelligent surface- (RIS-) assisted communication system under eavesdropping attack. Specifically, in our proposed system, consider that the RIS is known to legitimate user while not eavesdropper (Eve). manner, reflective elements of are adjusted strengthen keen signals suppressing Eve...

Journal: :IET Communications 2010
Ioannis Krikidis

This study deals with opportunistic relay selection in cooperative networks with secrecy constraints, where an eavesdropper node tries to overhead the source message. Previously reported relay selection techniques are optimised for non-eavesdropper environments and cannot ensure security. Two new opportunistic relay selection techniques, which incorporate the quality of the relay-eavesdropper l...

2015
Abhishek R. Malviya Balaso N. Jagdale

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may to attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy ...

Journal: :EURASIP J. Adv. Sig. Proc. 2014
Mujun Qian Chen Liu Youhua Fu

This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay...

2002
Arindam Mitra

Existing quantum key distribution schemes need the support of classical authentication scheme to ensure security. This is a conceptual drawback of quantum cryptography. It is pointed out that quantum cryptosystem does not need any support of classical cryptosystem to ensure security. No-cloning principal can alone provide security in communication. Even no-cloning principle itself can help to a...

2014
HongZhe Shi Alan Tennant

Conventional wireless communications could be threatened by an eavesdropper with a sufficiently sensitive receiver and unlimited computational resources, or may reach the channel capacity in the near future. Recent research into a new digital modulation technique termed Direct Antenna Modulation (DAM) shows that DAM is a potential solution to the aforementioned problems. Direction-dependency, w...

Journal: :Entropy 2021

We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages the message mode, while being undetectable mode. Under there is therefore no disturbance mode mutual information between sender receiver always constant equal to one copied by are genuine. An can only be detected control but level of detection at p...

Journal: :IEEE Wireless Communications Letters 2021

We propose a novel attack that compromises the physical layer security in wireless systems with eavesdropper's channel state information at transmitter side. This technique is based on transmission of slowly-varying random symbol by eavesdropper during its uplink transmission, so equivalent fading observed base station (BS) has larger variance. Then, BS designs secure downlink under assumption ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید