The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It becomes essential when reasoning about the security risks to critical utilities such electrical power and water distribution to recognize that the interests of producers and consumers do not fully coincide. They may have incentives to behave strategically towards each other, as well as toward some third party adversary. We therefore argue for the need to extend the prior literature, which has concentrated...
Quantum cryptographic key exchange is a promising technology for future secret transmission, which avoids computational infeasibility assumptions, while (almost) not presuming pre-shared secrets to be available in each peer’s machine. Nevertheless, a modest amount of pre-shared secret information is required in adjacent link devices, but this information is only needed for authentication purposes...
Secure communication is often based on encryption thus hinges on (public-key) infrastructures that handle all the key-management. This inevitably requires human intervention, thus creating a rather vulnerable point in the system. So it appears desirable to automate key-management tasks to the widest possible extent. In this work, we report on a software implementation of secure multipath transmission...
Major goals of system security comprise confidentiality, integrity, availability, authenticity, and reliability. All of these have seen comprehensive treatment, yielding a vast collection of solutions. Information-theoretic security regarding confidentiality has seen considerable progress recently with the development of commercial quantum cryptographic devices. Solutions for perfectly secure authentication...
Among the various proposals for quantum network design, the trusted node model is still the most flexible one for delivery of messages over arbitrary long distances. However, the outstanding security features of these networks are equally well defeated by the trusted relay. In brief this means, that messages sent over a certain node become completely insecure as soon as the node is compromised and...
Quantum cryptographic key distribution (QKD) is a promising candidate for achieving unconditional security, making the renowned one-time pad encryption technically feasible for building computer networks. However, although well-developed theoretical foundations perfectly ensure protection against eavesdropping, no natural mechanism is yet able to successfully repel an adversary sitting between Alice...
In this paper we discuss types of imprecision that are important for a tactical driver assistance system during its reasoning process. Methods for handling imprecision are presented using a previously developed overtake assistant as a showcase. The ideas for handling imprecision are demonstrated using several examples, together with the application of different approaches for different types of uncertainty...
We present a general framework for casting the problem of designing secure quantum networks into a classical optimization problem. We introduce a measure of risk that serves as upper bound on the probability of loosing a message to the adversary. Based on this results, we can transform the problem of secure network design into an optimization procedure, which opens the field for the entire framework...
The current standard to exchange a secret key for ensuring secure data transmission within the SSL/TLS protocol is based on Public-Key encryption. This method is only secure as long as the computation power of a potential attacker is limited. So far, the only way to make an unconditional secure key exchange, is to use quantum key distribution (QKD). With the latest figures of sifting key rates provided...
Unconditional security is the key-feature of quantum cryptography, which makes it superior to any classical encryption scheme. Most research in this area focuses on analyzing the theoretical properties and performance of particular quantum key distribution protocols, but a rigorous analysis on the network level seems to be missing. We present a game-theoretic approach which gives simple and tight...
The aim of this paper is to show that external influences like temperature, humidity, sunshine duration and global radiation have effect on the quality of quantum key distribution (QKD). It will be explained how the qubit error rate is correlated to these external influences. The correlations between the different influences will be analyzed using statistical methods, in particular generalized linear...
We present an extension to the error correction facility that is at the core of classical quantum cryptographic key exchange in the spirit of the BB84 protocol. The Cascade error correction scheme proposed along with the experimental implementation of BB84 can significantly be improved by endowing it with an adaptive initial block size selection strategy that takes into account information from past...
Companies running research and development (R&D) departments invest considerable effort into the protection of results and security of communication channels. In cases where particular expertise is unavailable within the company, R&D may be partially outsourced to external specialists being universities or independent research centers. In any such case where highly valuable data is to be exchanged...
Cooperative driving is currently an active area of research, where considerable effort is put on providing drivers with precise information about their surrounding and actions of others in order to have a valuable decision support system. Still, the final decision does and should always remain with the driver. Hence, any recommendation may be followed or disregarded by the driver, yielding to avoidance...
We present a general method to measure the distance to arbitrary static points from a fairly straight moving camera in the context of highways. We assume that the speed of the camera and vehicle, respectively, can be obtained somehow on board. The proposed approach does not require a calibrated camera and there is no need for an auto-calibration step to determine the cameras intrinsics on-line. To...
This paper presents extensions to the classical point- to-point protocol PPP [RFC1661] and IPSEC [RFC 2401] in order to build networks that can do unconditionally secure message relay. Our work addresses the problem of how to integrate quantum key distribution (QKD) in networks such that little effort needs to be put on protocol engine adaption and network topology design. This article demonstrates...
Most recent developments in car technology promise that future cars will be equipped with many cameras facing different directions (e.g.: headlights, wing mirrors, break lights etc.). This work investigates the possibility of letting the cameras calibrate and localize themselves relative to each other by tracking one arbitrary and fixed calibration object (e.g.: a traffic sign). Since the fields of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.