The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this...
In this work, information security of a cooperative wireless communication system over three-phase amplify-and-forward (AF) two-way relaying channels is investigated. A relay power allocation scheme is proposed to improve secrecy capacity of the system. We first derive the secrecy rate expression for the basic scenario which consists of one source, one destination, one single relay, and an eavesdropper...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
In the conventional directional modulation (DM) system without relay aiding, when the eavesdropper locates within the main-beam of the desired direction, it can intercept the confidential message from source Alice. In this paper, we propose a strategy to enhance physical-layer security of direction modulation in wireless transmission with the help of multi-relay cooperation. In this scenario, the...
Internet of Things (IoT) depicts an intelligent future, where any IoT-based devices having a sensorial and computing capabilities to interact with each other. Recently, we are living in the area of internet and rapidly moving towards a smart planet where devices are capable to be connected to each other. Cooperative ad-hoc vehicle systems are the main driving force for the actualization of IoT-based...
This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by a passive eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information...
As more components of Cyber-Physical Systems (CPSes) get interconnected, their protection becomes imperative. For instance, Networked CPSes (NCPSes) which consist of multiple CPSes have greater attack surfaces given the added communication layer among member CPSes, and the inter-dependency between their physical and cyber subsystems. In particular, an attack on one subsystem may affect both. While...
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source,...
Low latency anonymity systems, like Tor and I2P, support private online communications, but offer limited protection against powerful adversaries with widespread eavesdropping capabilities. It is known that general-purpose communications, such as web and file transfer, are difficult to protect in that setting. However, online instant messaging only requires a low bandwidth and we show it to be amenable...
In this paper, an improved cooperative jamming (CJ) strategy is developed for physical layer (PHY) security in a multi-hop wireless communication system which employs beamforming in the last hop. Users are assigned to independent groups based on the merger-and-split rule in a coalition game. The secrecy capacity for a valid coalition is a non-convex optimization problem which cannot easily be solved...
This paper studies the secrecy capacity scaling in an Amplify-and-Forward (AF) dual-phase large network containing K relays. In our model, part of these K relays are assumed to be potential eavesdroppers. Before transmitting the message in the first phase, the multi-antennas source divides it to partial messages and multicasts each part to a different disjoint sector. During the second phase, the...
In India agriculture plays a very important role. The Indian economy is also greatly affected by agricultural, as about 50 percent of total population is directly or indirectly depend on the agricultural related activities. A farmer has to go to the farm to check the water level in the field and to turn on and turn off the water pump, sometimes even in the middle of the night. This problem can be...
Recently, IoT (Internet of Things) security is a critical issue while IoT is a big trend where a huge number of devices would be connected to the Internet. We focus on protecting physical devices from illegal access by intruders and give basic analysis for fundamental gaps between physical devices and embedded IoT softwares. We clarify that the critical difficulty in IoT security is implementing both...
This paper investigates the secrecy performance of half-duplex relay networks. First, we establish a relay broadcasting wiretap channel model using a half-duplex relay with multiple antennas and derive the instantaneous secrecy capacity of this system. With convex optimization, the upper bound on the capacity region is provided. Second, we give the expression for the ergodic secrecy rate and analyze...
This paper investigates the secrecy rates and optimal power allocation schemes of a decode-and-forward (DF) wiretap relay channel where a relay operates in a full-duplex (FD) mode. A practical self-interference model is adopted to take into account the effect of residual self-interference. At first, we demonstrate that while the optimal power allocation schemes between the source and the relay are...
In this paper, we investigate the secrecy performance of a hybrid satellite-terrestrial relay network, where a satellite communicates with a terrestrial destination via multiple relays in the presence of eavesdropper. Particularly, to strengthen the system security against wiretapping attack, we present amplify-and-forward (AF) based optimal and partial relay selection schemes to minimize the secrecy...
We consider a cooperative relay network in the presence of many eavesdroppers whose locations are distributed according to a homogeneous Poisson point process. The relay, which operates in amplify-and-forward protocol, has very large transmit and receive antenna arrays, while other nodes are equipped with a single antenna. We assume that the relay exploits maximum ratio combing (MRC) in the uplink...
Wireless Sensor Networks have been known and used for a long time, but as time passed they started to improve and generate more interest from end users. As the attention increased, so did the attacks on these, due to their limited capacities and methods to employ an efficient protection. The key interest for current research teams is to develop methods to protect data without impacting the communication...
This paper presents the development of wide area protection (WAP). The studied case focuses on Vientiane Capital area, Lao PDR. It consists seven substations which are connected the loop network in 22 kV distribution system. The protection system based a characteristic are setting on substation each. The fault area in circuit mainly was affecting the operation of protection, when has occurred a fault...
We consider a line current differential protection (LCDP) system, where the protective relays communicate via Ethernet-based networks. In correct function, LCDP devices switch off the protected power line in case of a fault. Since such a switching may immensely effect the entire power grid, the communication line between the protective relays is an attractive target to attack power grids. For LCDP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.