228 resultados para secrecy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A digital directional modulation (DM) transmitter structure is proposed from a practical implementation point of view in this paper. This digital DM architecture is built with the help of several off-the-shelf physical layer wireless experiment platform hardware boards. When compared with previous analogue DM transmitter architectures, the digital means offers more precise and fast control on the updates of the array excitations. More importantly, it is an ideal physical arrangement to implement the most universal DM synthesis algorithm, i.e., the orthogonal vector approach. The practical issues in digital DM system calibrations are described and solved. The bit error rates (BERs) are measured via real-time data transmissions to illustrate the DM advantages, in terms of secrecy performance, over conventional non-DM beam-steering transmitters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose general-order transmit antenna selection to enhance the secrecy performance of multiple-input–multiple-output multieavesdropper channels with outdated channel state information (CSI) at the transmitter. To evaluate the effect of the outdated CSI on the secure transmission of the system, we investigate the secrecy performance for two practical scenarios, i.e., Scenarios I and II, where the eavesdropper's CSI is not available at the transmitter and is available at the transmitter, respectively. For Scenario I, we derive exact and asymptotic closed-form expressions for the secrecy outage probability in Nakagami- m fading channels. In addition, we also derive the probability of nonzero secrecy capacity and the \varepsilon -outage secrecy capacity, respectively. Simple asymptotic expressions for the secrecy outage probability reveal that the secrecy diversity order is reduced when the CSI is outdated at the transmitter, and it is independent of the number of antennas at each eavesdropper N_text\rm{E} , the fading parameter of the eavesdropper's channel m_text\rm{E} , and the number of eavesdroppers M . For Scenario II, we make a comprehensive analysis of the average secrecy capacity obtained by the system. Specifically, new closed-form expressions for the exact and asymptotic average secrecy capacity are derived, which are valid for general systems with an arbitrary number of antennas, number of eavesdroppers, and fading severity parameters. Resorting to these results, we also determine a high signal-to-noise ratio power offset to explicitly quantify the impact of the main c- annel and the eavesdropper's channel on the average secrecy capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this reported work, the frequency diverse array concept is employed to construct an orthogonal frequency-division multiplexing (OFDM) transmitter that has the capability of securing wireless communication in free space directly in the physical-layer without the need for mathematical encryption. The characteristics of the proposed scheme in terms of its secrecy performance are validated via bit error rate simulation under both high and low signal to noise ratio scenarios using the IEEE 802.11 OFDM physical-layer specification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A relay network in which a source wishes to convey a confidential message to a legitimate destination with the assistance of trusted relays is considered. In particular, cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and secrecy outage probability (SOP) of the network are investigated first, and a tight upper bound for the SR and an exact formula for the SOP are derived. Next, asymptotic approximations for the SR and SOP in the high signal-to-noise ratio (SNR) regime are derived for two different schemes: i) cooperative beamforming and ii) multiuser selection. Further, a new concept of cooperative diversity gain, namely, adapted cooperative diversity gain (ACDG), which can be used to evaluate security level of a cooperative relaying network, is investigated. It is shown that the ACDG of cooperative beamforming is equal to the conventional cooperative diversity gain of traditional multiple-input single-output networks, while the ACDG of the multiuser scenario is equal to that of traditional single-input multiple-output networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we study a two-phase underlay cognitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system complexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Channel randomness can be exploited to generate secret keys. However, to ensure secrecy, it is necessary that the channel response of any eavesdropping party remain sufficiently de-correlated with that of the legitimate users'. In this paper, we investigate whether such de-correlation occurs for a body area network (BAN) operating in an indoor environment at 2.45 GHz. The hypothetical BAN configuration consisted of two legitimate transceivers, one situated on the user's left wrist and the other on the user's waist. The eavesdroppers were positioned in either a co-located or distributed manner in the area surrounding the BAN user. Using the simultaneous channel response measured at the legitimate BAN nodes and the eavesdropper positions for stationary and mobile scenarios, we analyze the localized correlation coefficient. This allows us to determine if it is possible to generate secret keys in the presence of multiple eavesdroppers in an indoor environment. Our experimental results show that although channel reciprocity was observed for both the stationary and the mobile scenarios, a higher de-correlation between the legitimate users' channels was observed for the stationary case. This indicates that mobile scenarios are better suited for secret key generation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

AIMS: To estimate 1) the associations between parent-adolescent relationship, parental knowledge and subsequent adolescent drinking frequency and 2) the influence of alcohol use on parental knowledge.

DESIGN: Path analysis of school based cohort study with annual surveys SETTING: Post primary schools from urban and intermediate/rural areas in Northern Ireland PARTICIPANTS: 4,937 post primary school students aged around 11 years in 2000 followed until around age 16 in 2005.

MEASUREMENTS: Pupil reported measures of: frequency of alcohol use; parental-child relationship quality; sub-dimensions of parental monitoring: parental control, parental solicitation, child disclosure and child secrecy.

FINDINGS: Higher levels of parental control (Ordinal logistic OR 0.86 95% CI 0.78, 0.95) and lower levels of child secrecy (OR 0.83 95% CI 0.75 0.92) were associated with less frequent alcohol use subsequently. Parental solicitation and parent-child relationship quality were not associated with drinking frequency. Weekly alcohol drinking was associated with higher subsequent secrecy (Beta -0.42 95% CI -0.53, -0.32) and lower parental control (Beta -0.15 95% CI -0.26, -0.04). Secrecy was more strongly predictive of alcohol use at younger compared with older ages (P=0.02), and alcohol use was less strongly associated with parental control among families with poorer relationships (P=0.04).

CONCLUSIONS: Adolescent alcohol use appears to increase as parental control decreases and child secrecy increases. Greater parental control is associated with less frequent adolescent drinking subsequently, while parent-child attachment and parental solicitation have little influence on alcohol use. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present two physical layer secure transmission schemes for multi-user multi-relay networks, where the communication from M users to the base station is assisted by direct links and by N decode-and-forward relays. In this network, we consider that a passive eavesdropper exists to overhear the transmitted information, which entails exploiting the advantages of both direct and relay links for physical layer security enhancement. To fulfill this requirement, we investigate two criteria for user and relay selection and examine the achievable secrecy performance. Criterion I performs a joint user and relay selection, while Criterion II performs separate user and relay selections, with a lower implementation complexity. We derive a tight lower bound on the secrecy outage probability for Criterion I and an accurate analytical expression for the secrecy outage probability for Criterion II. We further derive the asymptotic secrecy outage probabilities at high transmit signal-to-noise ratios and high main-to-eavesdropper ratios for both criteria. We demonstrate that the secrecy diversity order is min (MN, M + N) for Criterion I, and N for Criterion II. Finally, we present numerical and simulation results to validate the proposed analysis, and show the occurrence condition of the secrecy outage probability floor

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Contabilidade e Finanças, sob orientação do Doutor José Campos Amorim

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A relação entre a Justiça e os media gerou, desde sempre, um debate controverso nas sociedades. Há opiniões que advogam um afastamento total entre as duas áreas, em nome da imparcialidade e do rigor; outras vozes defendem a possibilidade de construção de pontes que favoreçam o dever de informar enquanto bem público, essencial à concretização de uma verdadeira democracia. A presente dissertação pretende averiguar o papel do jornalismo judiciário na «denúncia» de casos de corrupção política em Portugal. Pode o jornalismo assumir uma função de «denunciante»? Estarão os jornalistas preparados para essa tarefa? É necessária uma maior aposta ao nível da formação de jornalistas? A todas estas questões procurámos dar resposta nas páginas que se seguem. A contextualização histórica e a referência a alguns dos casos de corrupção mais mediáticos da última década em Portugal ocupam a primeira parte da dissertação; pareceu-nos relevante revisitar alguns processos conhecidos do grande público para melhor enquadrar a problemática abordada, uma vez que os temas da justiça marcaram presença na imprensa, desde sempre. O relato que a comunicação social faz sobre os casos de corrupção política é objeto de reflexão na segunda parte da tese, tendo em conta os valores-notícia. Selecionámos a cobertura mediática do processo Face Oculta pelo jornal Público e pelo Correio da Manhã como caso de estudo e direcionámos a nossa análise em três fases distintas: divulgação pública da investigação da Polícia Judiciária (outubro de 2009), início do julgamento no Tribunal de Aveiro (novembro de 2011) e leitura do acórdão (setembro de 2014). Para melhor nos documentarmos sobre o processo, entrevistámos agentes da Justiça e dos media, que nos apresentaram a sua perspetiva sobre questões como o segredo de justiça ou a possível criação de gabinetes de imprensa nos tribunais. Na terceira e última parte da dissertação, procurámos enquadrar um conjunto de recomendações quer ao campo da justiça, quer ao campo mediático, com vista a uma relação profícua entre ambos e à concretização de um trabalho pedagógico no combate e na prevenção da corrupção política. Ao longo desta investigação, verifica-se que houve já alguns avanços na comunicação da justiça, mas conclui-se também que há ainda muito caminho a percorrer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technologic and socio-economic mutations have always determined challenges not only to lawyers, but to law itself. These phenomena have occurred specially when trying to deal with the hard task of finding solutions for the current increasing mismatch of social interests, for example, bank secrecy and money laundering. Usually occurring simultaneously, they are typical examples of outcomes generated by technological and socio-economic innovations that have become fashionable and captured international attention. At the same time, bank secrecy and money laundering support interests belonging to different dimensions, deserving to be balanced in the light of the heterogeneous mechanisms provided by the law to its practitioners and society as a hole. In order to achieve an outcome in accordance with the Rule of Law´s principles, lawyers´ tools are consequently subordinated to constitutional and social justice. Guided by this purpose, we performed the present study, aiming to analyse bank secrecy and money laundering in the light of the current stablished juridical procedures. We intended to develop a prudent point of view that is also in accordance with social reality. In sum, we demonstrate that bank secrecy should adopt a flexible character, embedding new settings and following the socio-economic path in a globalized world with constant innovations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Na fundamentada opinião de Javier del Moral1, a fonte de informação é “uma pessoa, um grupo de pessoas, organizadas ou não, que foram testemunhas ou conhecem os factos que o jornalista vai converter em notícia, de maneira direta (informação verbal) ou mediante a entrega de documentos”. O autor refere ainda que estes dois tipos de fontes se complementam. Desta forma, são um elemento central no processo de investigação, quer ao nível do jornalismo, quer ao nível dos órgãos de polícia criminal. Ambas as instâncias, para desenvolverem um trabalho aprofundado, necessitam de ter por base diversas informações, sendo estas fornecidas pelas fontes. Quanto mais credíveis forem as fontes, mais credíveis são as informações. A presente dissertação pretende averiguar qual o papel desenvolvido pelas fontes na investigação judiciária e na investigação jornalística. Tentaremos, ao longo deste estudo, perceber que diferenças existem entre aquelas que são as fontes da comunicação e aquelas que são as fontes da Justiça. Existirão semelhanças entre ambas? Podem os dois sistemas funcionar como fonte um do outro? É a estas perguntas que procurámos dar resposta. Queremos ainda identificar os cuidados necessários no relacionamento com as fontes de informação. E entender como é que estas podem contribuir para a produção da verdade jornalística e para a concreta realização da Justiça. Não deixaremos de parte um olhar abrangente sobre o relacionamento entre o sistema da Justiça e os Media. Uma relação que ao longo dos anos se tem revelado conflituosa, distante de uma comunicação possível, mas estritamente necessária ao funcionamento de uma sociedade democrática. Para que esta dissertação estivesse à luz daquilo que acontece atualmente nas redações e nos tribunais, entrevistámos agentes da Justiça e dos Media, que nos apresentam a sua visão sobre as fontes, sobre o segredo de justiça e sobre o jornalismo judiciário. Por fim e a título de ilustração, elaborámos um estudo de caso sobre a Tragédia do Meco, onde analisaremos dois dos principais jornais diários portugueses: o Correio da Manhã e o Público. O objetivo é verificar o tratamento jornalístico-­‐judiciário que foi feito durante a primeira semana do acontecimento.