ترغب بنشر مسار تعليمي؟ اضغط هنا

Securing AODV for MANETs using Message Digest with Secret Key

19   0   0.0 ( 0 )
 نشر من قبل arXiv Admin
 تاريخ النشر 2010
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

This article has been withdrawn by arXiv admins because it contains plagiarized content from International Conference on Computer Networks and Security (ICCNS 2008, September 27-28, 2008): Securing AODV for MANETs using Message Digest with Secret Key, by Sunil J. Soni and Prashant B. Swadas.

قيم البحث

اقرأ أيضاً

We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce the computational and storage requirements at Bobs receiver by assuming simple per-subchannel detectors. We assume that Eve has global channel knowledge of all links in addition to high computational capabilities, where she adopts high-complexity detectors such as single-user maximum likelihood (ML), multiuser minimum-mean-square-error (MMSE), and multiuser ML. We analyze the correlation properties of the time-domain AN signal and illustrate how Eve can exploit them to reduce the AN effects. We prove that the number of useful AN streams that can degrade Eves signal-to-noise ratio (SNR) is dependent on the channel memories of Alices-Bob and Alices-Eve links. Furthermore, we enhance the system security for the case of partial Alices-Bob channel knowledge at Eve, where Eve only knows the precoding matrices of the data and AN signals instead of knowing the entire Alices-Bob channel matrices, and propose a hybrid scheme that integrates temporal AN with channel-based secret-key extraction.
We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eaves dropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to encrypt some data symbols which are then multiplexed in the frequency domain with the remaining unencrypted data symbols. To secure the unencrypted data symbols, Alice transmits an artificial-noise (AN) signal superimposed over her data signal. We propose a three-level optimization procedure to increase the average secrecy rate of this wiretap channel by optimizing the transmit power allocation between the encrypted data symbols, unencrypted data symbols and the AN symbols. Our numerical results show that the proposed scheme achieves considerable secrecy rate gains compared to the benchmark cases
124 - Shoma Matsui , Kai Cai 2019
In this paper we study a security problem of protecting secrets with multiple protections and minimum costs. The target system is modeled as a discrete-event system (DES) in which a few states are secrets, and there are multiple subsets of protectabl e events with different cost levels. We formulate the problem as to ensure that every string that reaches a secret state (from the initial state) contains a specified number of protectable events and the highest cost level of these events is minimum. We first provide a necessary and sufficient condition under which this security problem is solvable, and then propose an algorithm to solve the problem based on the supervisory control theory of DES. The resulting solution is a protection policy which specifies at each state which events to protect and the highest cost level of protecting these events is minimum. Finally, we demonstrate the effectiveness of our solution with a network security example.
Highly dynamic mobile ad-hoc networks (MANETs) are continuing to serve as one of the most challenging environments to develop and deploy robust, efficient, and scalable routing protocols. In this paper, we present DeepCQ+ routing which, in a novel ma nner, integrates emerging multi-agent deep reinforcement learning (MADRL) techniques into existing Q-learning-based routing protocols and their variants, and achieves persistently higher performance across a wide range of MANET configurations while training only on a limited range of network parameters and conditions. Quantitatively, DeepCQ+ shows consistently higher end-to-end throughput with lower overhead compared to its Q-learning-based counterparts with the overall gain of 10-15% in its efficiency. Qualitatively and more significantly, DeepCQ+ maintains remarkably similar performance gains under many scenarios that it was not trained for in terms of network sizes, mobility conditions, and traffic dynamics. To the best of our knowledge, this is the first successful demonstration of MADRL for the MANET routing problem that achieves and maintains a high degree of scalability and robustness even in the environments that are outside the trained range of scenarios. This implies that the proposed hybrid design approach of DeepCQ+ that combines MADRL and Q-learning significantly increases its practicality and explainability because the real-world MANET environment will likely vary outside the trained range of MANET scenarios.
In this work, we consider a complete covert communication system, which includes the source-model of a stealthy secret key generation (SSKG) as the first phase. The generated key will be used for the covert communication in the second phase of the cu rrent round and also in the first phase of the next round. We investigate the stealthy SK rate performance of the first phase. The derived results show that the SK capacity lower and upper bounds of the source-model SKG are not affected by the additional stealth constraint. This result implies that we can attain the SSKG capacity for free when the sequences observed by the three terminals Alice ($X^n$), Bob ($Y^n$) and Willie ($Z^n$) follow a Markov chain relationship, i.e., $X^n-Y^n-Z^n$. We then prove that the sufficient condition to attain both, the SK capacity as well as the SSK capacity, can be relaxed from physical to stochastic degradedness. In order to underline the practical relevance, we also derive a sufficient condition to attain the degradedness by the usual stochastic order for Maurers fast fading Gaussian (satellite) model for the source of common randomness.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا