The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quantum Digital Signature (QDS) schemes provides authenticity of information that is guaranteed by quantum mechanics. This paper compares the blind signature schemes with two and three-bit quantum state bits and provides a implementation for the four quantum states. We proposed a technique where four partial entangled states are used to implement the blind signature scheme. The proposed technique...
This research paper proposes and analyzes a hardware based specification rules approach for detecting malicious behaviors of sensors and actuators embedded in medical devices in which the safety of the patient is critical and of utmost importance. The study includes four types of medical devices, namely the Vital Sign Monitor (VSM), Patient Analgesic Control (PCA), Cardiac Device (CD), and Continuous...
This paper presents two different implementations for recognition of handwritten numerals using a high performance autoencoder and Principal Component Analysis (PCA) by making use of neural networks. Different from other approaches, the non-linear mapping capability of neural networks is used extensively here. The implementation involves the deployment of a neural network, and the use of an auto encoder...
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes...
Wireless sensor networks (WSNs) are used in the many critical applications, such as, military, health, and civil applications. Sometimes such applications require that the WSNs to be randomly deployed in inaccessible terrains such as a remote territory. As a result, the sensors are left unattended and become a potential target for an adversary. Therefore, we propose a highly Secure and Efficient Key...
This paper presents a new scheme for the Distance Source Routing (DSR) protocol which shows the improvement over the two major metrics of the DSR protocol: Route Discovery and Route Maintenance. In addition, we present a mathematical model that includes probability density function for these two observed metrics. Our simulation results demonstrate a significant improvement in the route discovery,...
Most of mobile applications tend to function in an insecure manner whenever they are presented with SSL certificates which cannot be trusted. This is true for the applications which are not web browsers and need to connect/communicate with the internet as a part of their operation. This paper intends to research and show if proxy SSL based attacks can be used to steal user's credentials when they...
A mono static pulse radar is a type of radar in which its transmitter and receiver are collocated. It uses the same antenna to transmit and receive echo signals. This paper focusses on the design of monostatic pulse radar using Ultra Wide band. In this design, we use the transmitter which sends a pulse that hits the target and the receiver receives the echo signal where it can estimate the target's...
Einstein-Podolsky-Rosen (EPR) is the building block of entanglement-based and entanglement-assisted quantum communication protocols. Prior shared EPR pair and an authenticated classical channel allow two distant users to share a secret key. To build a network architecture where a centralized EPR source creates entangled states by the process of spontaneous parametric down-conversion (SPDC) then routes...
Wireless Local Area Networks (WLANs) are increasingly integrated into our daily lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are responsible for coordinating wireless users and connecting them to the wired side of the network and, eventually, to the Internet. APs are deployed everywhere, from airports and shopping malls to coffee shops and hospitals, to provide...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have been developed based upon the rule of physics. These QKD protocols were represented by different algorithms with limited ability to stand up against quantum attacks. This paper evaluates...
Wireless sensor networks (WSNs) are susceptible to most security attacks. There are some limitations such as reliability, energy efficiency, and scalability, which affect sensor nodes. These limitations mostly affect the security of wireless networks. Also, limited capacity of sensor nodes accounts for the security attacks on WSNs. Applications such as military surveillance, traffic surveillance,...
In many wireless multimedia sensor networks (WMSNs) the nodes are static. However, node connection is subjected to change due to disruptions in wireless communication, power changes in transmission, or loss of synchronization between neighboring nodes. A sensor should constantly be aware of its immediate neighbors, through a process called continuous neighbor discovery. In this paper we introduce...
Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build a quantum channel between two unauthenticated to each other parties, first, a trusted authority is needed to establish a mutual authentication with each party. Using Bell measurement...
This article aims to build a misuse Wireless Local Area Network Intrusion Detection System (WIDS), and to discover some important fields in WLAN MAC-layer frame to differentiate the attackers from the legitimate devices. We tested several machine-learning algorithms, and found some promising ones to improve the accuracy and computation time on a public dataset. The best performing algorithms that...
ELearning (Electronic Learning) and m-learning (Mobile Learning) systems are online learning platforms. In our research we are modeling them as a weighted directed graph where each node represents a course unit. A directed graph represents an accurate picture of course descriptions for online courses through the computer-based implementation of various educational systems. The Learning Path Graph...
The aim of quantum cryptography is to overcome the everlasting problem of unrestricted security in private communication. The usage of the quantum principles protects the privacy of the user's data during the time it is in the transmission process through the telecommunication channels. The sophisticated algorithm we have developed will make the data meaningless to eavesdroppers. The security of modern...
Many algorithms and techniques were proposed to increase the efficiency of Sensor Networks. Due to high restrictions of this kind of networks, where the resources are limited, many factors may affect its work. Theses factors are: System throughput, system delay, and energy. Clustering protocols have been propose to decrease system throughput and system delay, and increase energy saving. In this paper,...
Advanced Techniques in Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Advanced Techniques in Computing Sciences and Software Engineering includes selected papers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.