摘要 :
In this paper, we survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. We dis...
展开
In this paper, we survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. We discuss the major characteristics and advantages of these schemes especially in comparison with quantum encryption, and analyze some of the technical challenges of its implementation, too. Finally, we outline some ideas about how to use already existing and currently used wire lines, such as power lines, phone lines, internet lines to implement unconditionally secure information networks.
收起
摘要 :
Secure bootstrapping of mobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust relationships prior to the network deployment. In recent years, a number of schemes...
展开
Secure bootstrapping of mobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust relationships prior to the network deployment. In recent years, a number of schemes have been proposed to solve this problem, assuming either no or limited trust between the nodes prior to their deployment. Despite numerous proposals, there is no common understanding of the proposed schemes and of the trade-offs that they provide. This has consequences for both researchers and practitioners, who do not have a clear idea how to compare the schemes and how to select a scheme for a given application. In this article, we present a framework that helps in understanding and comparing schemes for secure bootstrapping of MANETs. The framework is general because it is policy-neutral and can accommodate many existing bootstrapping schemes. The proposed framework can equally serve as a good basis for the development of new MANET bootstrapping schemes; we show how the development of the framework leads to two new (classes of) distributed bootstrapping schemes. Within the framework, we not only investigate and characterize the properties of the relevant bootstrapping schemes, but also give methods for practitioners to select the relevant system parameters in the Random Walk and the (Restricted) Random Waypoint mobility models.
收起
摘要 :
This paper studies the problem of secure communication over a noiseless network from an information-theoretic perspective. A single-source single-sink acyclic planar network is considered, and the communication between the source ...
展开
This paper studies the problem of secure communication over a noiseless network from an information-theoretic perspective. A single-source single-sink acyclic planar network is considered, and the communication between the source and the sink is subject to noncooperative eavesdropping on each link. Using equivocation to measure the confidentiality of messages, we establish sufficient conditions, in terms of communication rates and network parameters, for provably secure communication. A constructive proof, which combines Shannon's key encryption and the Ford–Fulkerson algorithm, is provided and constitutes a readily implementable secure coding scheme. The derived achievable rate equivocation region is tight when specializing to several special cases. In particular, when the communication network decouples into nonoverlapping parallel paths, the proposed encoding scheme is optimal, i.e., it achieves the secure communication capacity for such networks.
收起
摘要 :
The recent advances in cryptanalysis techniques are the major threat to cryptography. A leakage of information about the cryptosystem used by either a fatal shortcoming or an insider enemy can easily defeat the cryptographic goal....
展开
The recent advances in cryptanalysis techniques are the major threat to cryptography. A leakage of information about the cryptosystem used by either a fatal shortcoming or an insider enemy can easily defeat the cryptographic goal. An adversary may succeed in decrypting ciphertexts, while users of a particular cryptosystem unwarily continue using same vulnerable encryption techniques. Such major concerns motivate the development of a novel Innocent-Cipher-Based Cryptography Paradigm (Innocipher), which is presented in this paper. Innocipher focuses on high level security that protects private information through two phases. First, Innocipher system conceals the required data in a legible form of legitimate plaintext other than ciphertext, for example, legitimate text, graph, game, and image, that looks benign and legitimate. Second, it converts the output of the first phase, the encoded data in the legible form, into a ciphertext. The main advantage of the Innocipher paradigm is that if a worst case scenario occurred, which is an adversary succeeding in decrypting a cipher message, then an adversary will be fooled by getting a legible form of legitimate text. At this point, the adversary will stop any further investigation while an original message is not revealed. This fooling mechanism of Innocipher is the key-feature that enables a multilayer of security for protecting valuable information. The presented implementation and validation of Innocipher demonstrates the robust capabilities of achieving the goal of securing information in static stage and during data transmission to its legitimate recipient.
收起
摘要 :
Industrie 4.0 fosters the concept of systems within one company to communicate with external systems in other companies or cloud services. Such communication across security domains creates new challenges as multiple stakeholders ...
展开
Industrie 4.0 fosters the concept of systems within one company to communicate with external systems in other companies or cloud services. Such communication across security domains creates new challenges as multiple stakeholders with different, sometimes conflicting objectives are involved. Typical examples are confidentiality versus monitoring. Current security architectures and protocols are not designed to resolve these challenges.
收起
摘要 :
Nowadays, TLS protocols are being used in almost every application. It is the most used method for ensuring secure communication and transfer of data between web-browser (client) and web-page (server). In the present paper the str...
展开
Nowadays, TLS protocols are being used in almost every application. It is the most used method for ensuring secure communication and transfer of data between web-browser (client) and web-page (server). In the present paper the strentghs and weaknesses of TLS 1.2 and TLS 1.3 and their security concerns are discussed. The final part of the paper addresses the matter, how the hackers can use TLS 1.3 shortcomings for their advantage.
收起
摘要 :
Reconfigurable intelligent surface (RIS) technology is considered one of the leading technologies for sixth-generation wireless communication, and it has also been revealed to be effective in enhancing secure and reliable communic...
展开
Reconfigurable intelligent surface (RIS) technology is considered one of the leading technologies for sixth-generation wireless communication, and it has also been revealed to be effective in enhancing secure and reliable communications. This article investigates using RIS to improve physical layer security and data transmission in underlay cognitive radio networks (CRNs). Because of its capability to control the wireless environment, RIS can enhance the security of the primary network (PN) and increase the reliability of the secondary network (SN) data transmission. This approach is practical and beneficial for both the PN and SN in terms of reliability and security. The study focuses on a scenario where the eavesdropper is passive and uses either selection or maximal ratio combining to combine the signals from the PN. Analytical expressions for the secrecy outage probability and the probability of nonzero secrecy capacity of the PN are derived. Additionally, an expression for the SN outage probability is also provided. The results from simulations and the numerical analysis confirm the benefits of the proposed system model and validate the accuracy of the derived expressions. This work provides valuable insights into the integration of RIS with CRNs and highlights the potential role of RIS in the future of wireless communication systems.
收起
摘要 :
The impulsive synchronization has been employed to synchronize two different hyperchaotic (chaotic) systems. Conditions on impulse distances are given in order to obtain stable synchronization in the nominal case and robust stabil...
展开
The impulsive synchronization has been employed to synchronize two different hyperchaotic (chaotic) systems. Conditions on impulse distances are given in order to obtain stable synchronization in the nominal case and robust stability in the case that we experience uncertainties in the systems dynamic and/or measurement noise. Under the given conditions, it is guaranteed that the error dynamics is asymptotically stable for the nominal case and convergent to a predetermined level for uncertain and/or noisy circumstances. Computer simulations are provided to assess results of the given theorems in the paper. (c) 2006 Elsevier Ltd. All rights reserved.
收起
摘要 :
When it comes to cybersecurity, Washington faces an uphill battle that it is losing. No form of military combat is more irregular than an electronic attack: it is extremely cheap and very fast, and it can be carried out anonymousl...
展开
When it comes to cybersecurity, Washington faces an uphill battle that it is losing. No form of military combat is more irregular than an electronic attack: it is extremely cheap and very fast, and it can be carried out anonymously to disrupt or deny critical services at the moment of maximum peril. It is not an abstract future threat: the U.S. is already engaged in low-intensity cyber-warfare, at a time when the physical hardware components that undergird the U.S. information highway are becoming increasingly insecure.
收起
摘要 :
Reconfigurable intelligent surfaces (RISs) are recognized with great potential to strengthen wireless security, yet the performance gain largely depends on the deployment location of RISs in the network topology. In this article, ...
展开
Reconfigurable intelligent surfaces (RISs) are recognized with great potential to strengthen wireless security, yet the performance gain largely depends on the deployment location of RISs in the network topology. In this article, we consider the anti-eavesdropping communication established through an RIS at a fixed location, as well as an aerial platform mounting another RIS and a friendly jammer to further improve the secrecy. The aerial RIS helps enhance the legitimate signal and the aerial cooperative jamming is strengthened through the fixed RIS. The security gain with aerial reflection and jamming is further improved with the optimized deployment of the aerial platform. We particularly consider the imperfect channel state information issue and address the worst case secrecy for robust performance. The formulated robust secrecy rate maximization problem is decomposed into two layers, where the inner layer solves for reflection and jamming with robust optimization, and the outer layer tackles the aerial deployment through deep reinforcement learning. Simulation results show the deployment under different network topologies and demonstrate the performance superiority of our proposal in terms of the worst case security provisioning as compared with the baselines.
收起