The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
Current requirements for vehicular video security systems are making it more challenging to handle the ever-increasing amount of video data produced by the video security systems installed within vehicles. Due to different standard regulations and recommendations, and quite often because of the requirements set by the operators themselves, recorded data not only needs to be stored temporarily within...
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally implemented over wireless networked control systems (WNCS). The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through...
Next-generation 5G converged networks need to support applications requiring ultra-high speed wireless links exceeding 1 Gb/s, e.g. large file transfer and high definition video streaming, e.g. for D2D and D2I communications. Here, we describe wireless networking throughput beyond gigabit rates employing the 24 GHz (unlicensed ISM), and 60 GHz (802.11ad standard) bands. 802.11ad offers large available...
Most of current physical-layer security techniques rely on a degraded eavesdropper, thus warranting some sort of advantage that can be relied upon to achieve higher levels of security. We consider instead non-degraded eavesdroppers, that possess equal or better capabilities than legitimate receivers. Under this challenging setup, most of current physical-layer security techniques become hard to administer...
Nowadays networking is secure because we encrypt the confidential messages with the underlying assumption that adversaries in the network are computationally bounded. For traditional routing or network coding, routers know the contents of the packets they receive. Networking is not secure any more if there are eavesdroppers with infinite computational power at routers. Our concern is whether we can...
We consider utilizing a buffer-aided relay to enhance security for two-hop half-duplex relay networks with an external eavesdropper. We propose a link selection scheme that adapts reception and transmission time slots based on the channel quality, while considering both the two-hop transmission efficiency and the security. Closed-form expressions for the secrecy throughput and the secrecy outage probability...
Encryption is a vital process to ensure the confidentiality of the information transmitted over the insecure wireless channel. However, the nature of the wireless channel tends to deteriorate because of noise, interference and fading. Therefore, the encrypted transmitted signal will be received with some amount of error. Consequently, due to the strict avalanche criterion (SAC), this error propagates...
For many utilities operators, making their electric grid smarter is an increasingly important task with the goal of creating a system that is optimized for efficient delivery of electricity. Automation has been the primary driver and many electric utilities have already implemented SCADA systems for control over transmission-level equipment. At the distribution automation layer, many critical functions...
In this paper 802.11 wireless peer-peer network is evaluated for both IPv4 and IPv6 in Windows 7 and Fedora 12 operating systems. IPv4 has higher throughput than IPv6 for all packet sizes for both Windows 7 and Fedora 12 operating systems. Results further indicate that implementing WPA2 wireless security reduces bandwidth and increase delay in wireless networks.
The impact of WPA2 security on performance of IPv4 and IPv6 on two client-server wireless 802.1 In networks implementing Windows Vista-Windows Server 2008 and Windows XP -Windows Server 2008 is investigated. Results indicated that for XP enabling WPA2 results in an average of approximately 7.07% less throughput than open systems for IPv4 and 5.42% less throughput for IPv6. Enabling WPA2 on Vista results...
In this paper an analytical study and novel concept of software, hardware and engineering of a new device is presented: the video surveillance local control unit (VSLC). Engineering and performance parameters of the VSLC will be evaluated. Subsequently, the state-prevent-event process of the video surveillance system will be analyzed. Accordingly, a new spectrum of applications of video surveillance...
We present a performance study of security overheads in 802.11g networks. At 54 Mbps, the security overhead becomes significant in single client scenarios for many of the popular security protocols. However, we find that the most secure protocol, WPA-2, is also the protocol with the lowest security overhead.
This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both TCP and UDP protocols. The parameters considered are throughput and response time. The results indicate that security mechanism does influence the wireless performance and different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.