Results 21 to 30 of about 4,330 (158)

Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication

open access: yesIEEE Access, 2019
This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time
Guojie Hu, Yueming Cai
doaj   +1 more source

Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

open access: yesIEEE Access, 2018
In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping.
Baogang Li   +4 more
doaj   +1 more source

Toward designing a quantum key distribution network simulation model [PDF]

open access: yes, 2016
As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical ...
Chromý, Erik   +3 more
core   +2 more sources

Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]

open access: yes, 2009
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core   +4 more sources

Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime

open access: yesSensors, 2019
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via the massive deployment of machine-type communication devices in order to greatly improve daily life. However, machine-type communications can be illegally used (e.g.,
Ruonan Dong, Baogang Li, Binyang Yan
doaj   +1 more source

Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems

open access: yesIEEE Access, 2019
Proactive eavesdropping is an effective method for government to monitor suspicious users who are deemed to misuse communication systems for illegal activities. In this paper, considering that a legitimate full-duplex (FD) eavesdropper tries to monitor a
Xingbo Lu   +3 more
doaj   +1 more source

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Secure Routing in Wireless Mesh Networks [PDF]

open access: yes, 2011
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core   +3 more sources

Design of Secure NOMA Against Full-Duplex Proactive Eavesdropping [PDF]

open access: yesIEEE Wireless Communications Letters, 2019
The problem of secure non-orthogonal multiple access (NOMA) against full-duplex proactive eavesdropping, where the eavesdropper performs passive eavesdropping and active jamming simultaneously to interrupt the NOMA transmissions. To avoid the transmission outage caused by the unknown jamming level from the eavesdropper, we propose a novel transmission ...
Lu Lv   +3 more
openaire   +1 more source

Software Defined Networks based Smart Grid Communication: A Comprehensive Survey [PDF]

open access: yes, 2019
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG).
Assi, Chadi   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy