The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present the design, implementation, and evaluation of an RFID-based cellphone anti-lost and anti-theft measure. The cellphone owner is given an audio-visual alert at the very instant of the lost event, and the cellphone deduces the fact that it is away from its owner and executes the safety measures. This is realized by equipping the cellphone with a low-power RFID Reader and tagging the owner...
Secret key establishment is a fundamental requirement for private communication between two wireless entities. An intriguing solution is to extract secret keys from the inherent randomness shared between them. Although several works have been done to extract secret keys from different kinds of mediums (e.g., RSSI, CSI, CIR), the efficiency and security problems are not fully solved. In this paper,...
The personalization is one of the main success factor in Mobile Commerce. This paper presents the main characteristic for Mobile Commerce and describes factors of personalization in Mobile Commerce, it also shows how these factors affects user satisfaction positively or negatively. The mechanism for personalization and recommendation system used in personalized Mobile Commerce are described. Many...
Key agreement using physical layer properties of communication channels is a well studied problem. iJam is a physical layer key agreement protocol that achieves security by creating a “virtual” wiretap channel for the adversary through a subprotocol between the sender and the receiver that uses self-jamming by the receiver. The protocol was implemented and its security was shown through extensive...
Protecting the security of the cyber-physical systems that make up the world's critical infrastructures has been a recent hotly debated topic. Legacy wireless communication infrastructure is often an impediment to quickly improving these crucial systems, as cryptographic solutions prove impossible to deploy. In this article, we propose the establishment of a separate verification layer for sensitive...
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However,...
Vehicular ad-hoc network (VANET) is an innovation that will change our vision of road traffic, it will improve the safety and the efficiently of transport. VANET represent a target for attacks that can cause human and material losses. This, highlights the need for a robust security system, who must secure effectively communications between vehicles and the different network's entities, but also, it...
Information security is a critical yet challenging issue for wireless communications. In this paper, we investigate this problem from a networked perspective. Specifically, we consider a wireless network where there coexists users with and without security concerns, which respectively maximize the secrecy rate and transmission rate. To enhance wireless security, we give the security-oriented user...
This paper proposes a Weighted fractional Fourier transform (WFRFT) based cooperation scheme to improve PHY layer security against eavesdropping in wireless communications. Rather than dissipating valuable transmission power to jam the eavesdropper, by leveraging the features of WFRFT, the information bearing signal can create “Artificial Noise” effect at the eavesdropper while imposing no effect...
Recently, there has been a surge of increased interest in using physical layer security to safeguard the fifth generation (5G) mobile networks. In this paper, we study the problem of secure communications in untrusted relay networks. A new nonorthogonal relaying protocol is proposed, aiming at maximizing the secrecy rate. Specifically, we allow the source and relay to transmit signals simultaneously...
It is well-known that wireless channel reciprocity together with fading can be exploited to generate a common secret key between two legitimate communication partners. This can be achieved by exchanging known deterministic pilot signals between both partners from which the random fading gains can be estimated and processed. However, the entropy and thus quality of the generated key depends on the...
This paper investigates a dynamic bandwidth allocation strategy with secrecy constraints, where big data can be viewed as a resource instead of a burden from the traditional perspective. Unlike usual cases, we take into account big data and security issues along with bandwidth allocation. It is reasonable to assume that big data derived from mobile network, by a series of processing, can generate...
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze forward error correcting codes. For this paper, we limit our analysis to coset-based wiretap...
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
Transmissions over the wiretap channel have been studied for a long time from the information theory standpoint. This has allowed to assess the secrecy performance against eavesdropping while ensuring reliable transmission towards the legitimate receiver. However, most previous studies rely on a number of assumptions which are far from practical wireless communications, like infinite length codewords,...
Advancements in mobile communication technologies and the continuously increasingly diffusion of smartphones equipped with several physical and virtual sensors and with different network support are promoting novel mobile healthcare scenarios where patients with critical physical/behavioral conditions can be provided with anywhere and anytime care assistance even while on the move. In particular,...
This paper considers a cellular multiple-input multiple-output multiple-eavesdropper (MIMOME) channel, with a pair of single-antenna device-to-device (D2D) nodes working as an underlay. A novel eavesdropping scenario is studied in this paper, where the eavesdroppers intend to simultaneously overhear the cellular communication and the D2D communication. Our goal is to jointly optimize the covariance...
In this paper, we derive the analytical expressions for the secure outage probability in a single-input single-output (SISO) system over fading, in which both the main and eavesdropper channels are subject to κ-μ fading. Many authors have analyzed the secrecy performance of such a SISO system over various fading models. More recently, a lower bound on the secure outage probability over κ-μ fading...
The Internet of Things (IoT) involves the increasing prevalence of objects and entities with the ability to transfer data over the network automatically. The main problem of IoT software system is that the security has not always been considered. This study applies five security design patterns for the development of an IoT software system. The security issue of unsecure application data is addressed...
In this paper, it is aimed to develop a wireless home automation and security system having an easy installation, as well as a robust and flexible realization. A low cost microcomputer is used as a server and necessary software programs are optimized and realized to interact with peripheral devices, which are specially designed for the proposed system. Proof of concept version is obtained after establishing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.