Results 21 to 30 of about 4,330 (158)
Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time
Guojie Hu, Yueming Cai
doaj +1 more source
Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System
In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping.
Baogang Li +4 more
doaj +1 more source
Toward designing a quantum key distribution network simulation model [PDF]
As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical ...
Chromý, Erik +3 more
core +2 more sources
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +4 more sources
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via the massive deployment of machine-type communication devices in order to greatly improve daily life. However, machine-type communications can be illegally used (e.g.,
Ruonan Dong, Baogang Li, Binyang Yan
doaj +1 more source
Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
Proactive eavesdropping is an effective method for government to monitor suspicious users who are deemed to misuse communication systems for illegal activities. In this paper, considering that a legitimate full-duplex (FD) eavesdropper tries to monitor a
Xingbo Lu +3 more
doaj +1 more source
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources
Secure Routing in Wireless Mesh Networks [PDF]
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core +3 more sources
Design of Secure NOMA Against Full-Duplex Proactive Eavesdropping [PDF]
The problem of secure non-orthogonal multiple access (NOMA) against full-duplex proactive eavesdropping, where the eavesdropper performs passive eavesdropping and active jamming simultaneously to interrupt the NOMA transmissions. To avoid the transmission outage caused by the unknown jamming level from the eavesdropper, we propose a novel transmission ...
Lu Lv +3 more
openaire +1 more source
Software Defined Networks based Smart Grid Communication: A Comprehensive Survey [PDF]
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG).
Assi, Chadi +3 more
core +2 more sources

