228 resultados para secrecy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maddrell, John, 'What we have discovered about the Cold War is what we already knew: Julius Mader and Western Espionage during the Cold War', Cold War History (2005) 5(2) pp.235-258 RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Scott, L. (2006). Labour and the Bomb: The First Eighty Years. International Affairs. 82(4), pp.685-700 RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Water operators need to be efficient, accountable, honest public institutions providing a universal service. Many water services however lack the institutional strength, the human resources, the technical expertise and equipment, or the financial or managerial capacity to provide these services. They need support to develop these capacities. The vast majority of water operators in the world are in the public sector – 90% of all major cities are served by such bodies. This means that the largest pool of experience and expertise, and the great majority of examples of good practice and sound institutions, are to be found in existing public sector water operators. Because they are public sector, however, they do not have any natural commercial incentive to provide international support. Their incentive stems from solidarity, not profit. Since 1990, however, the policies of donors and development banks have focussed on the private companies and their incentives. The vast resources of the public sector have been overlooked, even blocked by pro-private policies. Out of sight of these global policy-makers, however, a growing number of public sector water companies have been engaged, in a great variety of ways, in helping others develop the capacity to be effective and accountable public services. These supportive arrangements are now called 'public-public partnerships' (PUPs). A public-public partnership (PUP) is simply a collaboration between two or more public authorities or organisations, based on solidarity, to improve the capacity and effectiveness of one partner in providing public water or sanitation services. They have been described as: “a peer relationship forged around common values and objectives, which exclude profit-seeking”.1 Neither partner expects a commercial profit, directly or indirectly. This makes PUPs very different from the public–private partnerships (PPPs) which have been promoted by the international financial institutions (IFIs) like the World Bank. The problems of PPPs have been examined in a number of reports. A great advantage of PUPs is that they avoid the risks of such partnerships: transaction costs, contract failure, renegotiation, the complexities of regulation, commercial opportunism, monopoly pricing, commercial secrecy, currency risk, and lack of public legitimacy.2 PUPs are not merely an abstract concept. The list in the annexe to this paper includes over 130 PUPs in around 70 countries. This means that far more countries have hosted PUPs than host PPPs in water – according to a report from PPIAF in December 2008, there are only 44 countries with private participation in water. These PUPs cover a period of over 20 years, and been used in all regions of the world. The earliest date to the 1980s, when the Yokohama Waterworks Bureau first started partnerships to help train staff in other Asian countries. Many of the PUP projects have been initiated in the last few years, a result of the growing recognition of PUPs as a tool for achieving improvements in public water management. This paper attempts to provide an overview of the typical objectives of PUPs; the different forms of PUPs and partners involved; a series of case studies of actual PUPs; and an examination of the recent WOPs initiative. It then offers recommendations for future development of PUPs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The alleged problem of the dirty hands of politicians has been much discussed since Michael Walzer’s original piece (Walzer 1974). The discussion has concerned the precise nature of the problem or sought to dissolve the apparent paradox. However there has been little discussion of the putative complicity, and thus also dirtying of hands, of a democratic public that authorizes politicians to act in its name. This article outlines the sense in which politicians do get dirty hands and the degree to which a democratic public may also get dirty hands. It separates the questions of secrecy, authorisation, and wrongfulness in order to spell out the extent of public complicity. Finally it addresses the ways in which those who do and those who do not acknowledge the problem of dirty hands erroneously discount or deny the problem of complicity by an appeal to the nature of democracy, a putatively essential need for political openness or to the scope of ideal theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of secure transmission in two-hop amplify-and-forward untrusted relay networks. We analyze the ergodic secrecy capacity (ESC) and present compact expressions for the ESC in the high signal-to-noise ratio regime. We also examine the impact of large scale antenna arrays at either the source or the destination. For large antenna arrays at the source, we confirm that the ESC is solely determined by the channel between the relay and the destination. For very large antenna arrays at the destination, we confirm that the ESC is solely determined by the channel between the source and the relay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper metrics for assessing the performance of directional modulation (DM) physical-layer secure wireless systems are discussed. In the paper DM systems are shown to be categorized as static or dynamic. The behavior of each type of system is discussed for QPSK modulation. Besides EVM-like and BER metrics, secrecy rate as used in information theory community is also derived for the purpose of this QPSK DM system evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose physical layer security for cooperative cognitive radio networks (CCRNs) with relay selection in the presence of multiple primary users and multiple eavesdroppers. To be specific, we propose three relay selection schemes, namely, opportunistic relay selection (ORS), suboptimal relay selection (SoRS), and partial relay selection (PRS) for secured CCRNs, which are based on the availability of channel state information (CSI) at the receivers. For each approach, we derive exact and asymptotic expressions for the secrecy outage probability. Results show that under the assumption of perfect CSI, ORS outperforms both SoRS and PRS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes relay selection in order to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward (AF) relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criterion I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion,
which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to eavesdropper ratio (MER). From the asymptotic analysis, an interesting observation is reached: for each criterion, the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the impact of hardware impairments on secrecy performance of cognitive MIMO schemes is investigated. In addition, the relay which helps the source forward the source signal to the destination can operate either half-duplex mode or full-duplex mode. For performance evaluation, we give the expressions of average secrecy rate over Rayleigh fading channel. Monte-Carlo simulations are presented to compare and optimize the performance of the proposed schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.