27 resultados para Physical layer security

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work we evaluate the performance of routing protocols for mobile ad hoc networks using different physical layer models. The results obtained show that the performance results obtained using idealized models such as the free space propagation model vary significantly when propagation effects such as path loss and shadowing are considered. This difference in performance indicates that optimization is required in the protocol development space that takes into account channel state information (CSI). Such an optimization requires a cross layer approach to be adopted and a framework for protocol performance evaluation to be established. We believe that this work would serve as a first step in this direction. We provide comparative performance results through network simulations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cryptographic keys are necessary to secure communications among mesh clients in wireless mesh networks. Traditional key establishment schemes are implemented at higher layers, and the security of most such designs relies on the complexity of computational problems. Extracting cryptographic keys at the physical layer is a promising approach with information-theoretical security. But due to the nature of communications at the physical layer, none of the existing designs supports key establishment if communicating parties are out of each other's radio range, and all schemes are insecure against man-in-the-middle attacks. This paper presents a cross-layer key establishment scheme where the established key is determined by two partial keys: one extracted at the physical layer and the other generated at higher layers. The analysis shows that the proposed cross-layer key establishment scheme not only eliminates the aforementioned shortcomings of key establishment at each layer but also provides a flexible solution to the key generation rate problem. © 2014 Springer International Publishing Switzerland.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

One of the drawbacks of LEACH protocol is the uncontrolled selection of cluster heads which, in some rounds, leads to the concentration of them in a limited area due to the randomness of the selection procedure. LEACH-C is a variant of LEACH that uses a centralized clustering algorithm and forms good clusters through sink control. According to experimental results, the IEEE 802.15.4 packets are damaged by WLAN interferences in ISM band. It seems that, sensor nodes equipped with cognitive radio capabilities can overcome this problem. In cognitive radio sensor networks (CRSN), routing must be accompanied by channel allocation. This requires spectrum management which can be devolved to cluster heads. For this networks, new duty cycle mechanisms must be designed that jointly consider neighbor discovery, and spectrum sensing/allocation. Cluster-based network architecture is a good choice for effective dynamic spectrum management. In such architecture, cluster heads have a proper spatial distribution and are optimally located all over the network. In this paper, using the physical layer information and preserving the feature of random cluster head selection in LEACH, it has been tried to both move the position of cluster heads to appropriate locations and make their quantity optimal. The simulation results show that the transferal of cluster heads to appropriate locations increases the network lifetime significantly though this comes at the price of early instability appearance. By considering the energy level in cluster head election algorithm, one can overcome the network stability issues too. However, this will move the cluster heads away from their appropriate locations. © 2012 IEEE.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cyberspace, the ubiquitous space that exists in relation to the Internet, is usually referred to as a dynamic broad domain ranging from Internet and its infrastructures to social networks. More research work in security has been extended from securing computers to securing Cyberspace, which includes the physical-level security, the network-level security, and the application-level security and addresses improvements in Cyberspace management.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we propose a new clustered structure for a multiway relay network (MWRN) with G clusters, N users per cluster, one intracluster relay per cluster, and a single intercluster relay. The proposed structure allows private information exchange among users within a certain cluster through the corresponding intracluster relay and only public information exchange among users in different clusters through the intercluster relay.In this paper, we quantify the dominating error events in the proposed clustered MWRN and derive the expressions for the probability of these error events. Then, we use these expressions to derive the average bit error rate (BER) of a clustered MWRN. It is shown that clustering in an MWRN improves the error performance by reducing the number of dominating error events and, in effect, reducing error propagation, compared with the nonclustered counterpart. The analysis proves that the average BER of a clustered MWRN is minimized when the number ofclusters and the number of users per cluster are chosen to be the closest possible factors of the total number of users, i.e., L = GN. Finally, numerical simulation results are provided to verify the validity of the analysis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security provisioning is an essential part in the design of any communication systems, which becomes more critical for wireless systems. Devising a quality of service (QoS) mechanism to coexist security algorithms is a daunting, yet inevitable task. The aim of this novel research article is to present a novel energy efficient, cross-layer-based application-layer wireless system with simultaneous security and QoS supports, which revolves around the practical and low-cost implementation of Suite-B cryptographic algorithms (promulgated by the National Security Agency) and detailed analyses of the associated complexities. The focus of this article is on the novel cross-layer mechanism and its effectiveness to handle QoS-enabled treatment while offering security enhancements.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a distributed multi-agent scheme to detect and identify cyber threats on the protection systems of power grids. The integration of information and communication technologies (ICTs) into existing power grids builds critical cyberphysical energy systems CPESs) in which digital relays are networked cyber-physical components subject to various cyber threats. Cyber attacks on protection systems may mimic real faults, cause component failure, and disable the communication links. Agents utilize both cyber and physical properties to reinforce the detection technique and further distinguish cyber attacks from physical faults. This paper also introduces the problem of secure communicationprotocols and highlights the comparative studies for enhancing thesecurity of the protection systems. The proposed scheme is validatedusing a benchmark power system under various fault and cyber attack scenarios.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite recent advances in the area of humanitarian responses and the publication and dissemination of various guidelines with regard to nutritional interventions, there is, however a paucity of studies which have examined the human right to food in complex emergencies. 186 countries including those affected by both human made and natural disasters and countries who are donors of humanitarian relief aid adopted the Rome Declaration on Food Security and World Summit plan of Action reaffirming “ the right to adequate food and the fundamental right of everyone to be free from hunger”. The human right to adequate and nutritious food in refugee settings implies that every refugee has physical and economic access to sufficient food to provide the necessary nutrients for effective physical and physiological functions and achieve well being. There are many grounds for believing that the current humanitarian responses to disasters more often violate than respect the human right to adequate and nutritious food. Using elements of household food security as our working framework this paper focuses on the complex ethical and moral questions raised by the conventional humanitarian assistance framework and in particular the issue of human right to food and household food security in refugee settings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to understand how becoming a physical education teacher is shaped by personally and socially constructed knowledge and is affected by the rules and resources of the structural systems in which physical education teacher education (PETE) takes place. The study was influenced by the traditions of Personal Construct Theory (Kelly 1955), the theoretical tenets of social constructionism (Gergen 1991), and Giddens’s work on structuration (1984) and self-identity (1991). Ten PETE students participated in the study over almost three years. They undertook repertory grid sessions periodically through their study, followed by ‘learning conversations’, in which the grid itself was discussed, reworked and collaboratively analysed. All conversations were audio taped and were fully transcribed. The data were analysed in three ways, all of which were used to construct a story of the study. First, the grids were analysed for patterns, consistencies across students and for consistencies within students. These grids provided the first level story that related to constructions of knowledge. These constructions were then content analysed using analysis categories developed from Gergen’s notion of the saturated self and Giddens’ ideas of identity in late modernity. These analyses represented what Giddens calls a double hermeneutic since to all intents and purposes, the story of the study was constructed from the participants’ constructions of what it is to be a physical education teacher. The data suggests that during the process of constructing professional knowledge the student experienced a series of dilemmas of professional self-identity. It seems that to become a PE teacher, the dilemmas must be worked through until a position of what Giddens calls ontologist security has been achieved. Some students in this study had not managed to reach such a point before they left university and entered the teaching profession. In spite of this, the methods of the study allowed the participants to begin to articulate their theories and visions of teaching physical education. The therapeutic qualities of Kelly’s theory encouraged a number of the students to ‘see it differently’ (Rossi, 1997) and to begin to develop a rationale for physical education based on educational practice that considers the needs of individuals and the promotion of a socially just community. I have argued however that this ‘critical’ approach to physical education pedagogy was considered risky and as such students who were prepared to engage in such risk strategies also had other strategic relational selves (Gergen, 1991) to minimise risk at key times during their teacher education.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The thermal and mechanical properties of the ionic plastic crystal N-methyl-N-propylpyrrolidinium hexafluorophosphate have been investigated and the effect of adding a miscible polymer on the mechanical properties is reported. The physical properties of the pure plastic crystal are discussed in detail and for the first time the change in volume with temperature for an organic ionic plastic crystal is reported. An increase in volume in conjunction with increased conductivity supports the hypothesis that ion conduction within the plastic crystal proceeds via defects. For phase I and melting, the magnitude of the volume increase does not appear to be in accord with the subtle change in conductivity. This is suggested to be due to the presence of layer defects, which allow for correlated ionic motion, which does not increase the conductivity. Addition of polymer to the plastic crystal significantly increases the mechanical strength, decreases the conductivity, but has little effect on the phase behaviour, further supporting the hypothesis of vacancy-mediated conduction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The preparation and characterization of a series of ionic liquids based on S-alkyl thiolonium, S-alkyl thiotetrazolium, or S-alkyl thiobenzolium cations coupled with bis(trifluoromethanesulfonyl)amide, trifluoromethanesulfonate, alkyl phosphate, chloride, and hexafluorophosphate anions are reported. All are liquid at room temperature, except the chloride salt, which has a melting point of 92 °C. The electrochemical characteristics of this class of ionic liquid have been determined by cyclic voltammetry. Potential windows of the ionic liquids have been obtained at glassy carbon, platinum, and gold electrodes and found to be the largest at glassy carbon, but are limited by oxidation of the thioether-functionalized cation. The voltammetry of IUPAC reference potential scale systems, ferrocene/ferrocenium, cobaltocenium/cobaltocene, and decamethylferrocene/decamethylferrocenium have been evaluated, with the last being most widely applicable. Nonadditivity of Faradaic current is found in the voltammograms of decamethylferrocene in the presence of ferrocene and cobaltocenium. Diffusion coefficient, viscosity, ionic conductivity, double layer capacitance, and other physical properties have also been measured. The dependence of the diffusion coefficient vs viscosity follows the Stokes−Einstein relationship. The properties of the ionic liquids are compared with the related imidazolium family of ionic liquids.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Finite-element method is used to predict the buoyancy-driven convection in a horizontal layer of fluid (aluminum melt) overlying a porous layer (cathode) saturated with the same fluid. This work aims to compare the Hall–Héroult process in electrolytic cell, where a layer of molten aluminum is reduced over the porous cathode surface. In this study, the physical system of the aluminum melt (fluid) and cathode (porous) together is considered as a composite system of fluid overlying porous layer. The main objective of this study to analyse the velocity components in thin fluid layer and its impact on a porous cathode surface if there is any. In addition, an externally imposed time-independent uniform magnetic field is used to analyse its influence on natural convective forces. The physical system of fluid overlying porous layer is analysed at different Hartmann, Darcy, and fluid-Rayleigh numbers for a fixed Prandtl number (Pr = 0.014). The predicted data show that the convective forces, caused by buoyancy-driven flow, are significant. It is shown that the velocity peaks moves toward the solid wall because of the presence of a magnetic field creating a stronger boundary-layer growth over the permeable cathode surface. The predicted results are plotted in terms of average Nusselt number and Darcy number to indicate the influence of pores and permeability on overall convective heat-transfer characteristics.