3,490 research outputs found
Security of 5G-V2X: Technologies, Standardization and Research Directions
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to
the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to
Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities
involved in vehicular communications and allows the inclusion of
cellular-security solutions to be applied to V2X. For this, the evolvement of
LTE-V2X is revolutionary, but it fails to handle the demands of high
throughput, ultra-high reliability, and ultra-low latency alongside its
security mechanisms. To counter this, 5G-V2X is considered as an integral
solution, which not only resolves the issues related to LTE-V2X but also
provides a function-based network setup. Several reports have been given for
the security of 5G, but none of them primarily focuses on the security of
5G-V2X. This article provides a detailed overview of 5G-V2X with a
security-based comparison to LTE-V2X. A novel Security Reflex Function
(SRF)-based architecture is proposed and several research challenges are
presented related to the security of 5G-V2X. Furthermore, the article lays out
requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary
for 5G-V2X.Comment: 9 pages, 6 figures, Preprin
A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
The effect of noise on various protocols of secure quantum communication has
been studied. Specifically, we have investigated the effect of amplitude
damping, phase damping, squeezed generalized amplitude damping, Pauli type as
well as various collective noise models on the protocols of quantum key
distribution, quantum key agreement,quantum secure direct quantum communication
and quantum dialogue. From each type of protocol of secure quantum
communication, we have chosen two protocols for our comparative study; one
based on single qubit states and the other one on entangled states. The
comparative study reported here has revealed that single-qubit-based schemes
are generally found to perform better in the presence of amplitude damping,
phase damping, squeezed generalized amplitude damping noises, while
entanglement-based protocols turn out to be preferable in the presence of
collective noises. It is also observed that the effect of noise entirely
depends upon the number of rounds of quantum communication involved in a scheme
of quantum communication. Further, it is observed that squeezing, a completely
quantum mechanical resource present in the squeezed generalized amplitude
channel, can be used in a beneficial way as it may yield higher fidelity
compared to the corresponding zero squeezing case.Comment: 23 pages 7 figure
Investigation of tool geometry effect and penetration strategies on cutting forces during thread milling
The application of thread milling is increasing in industry because of its inherent advantages over other thread cutting techniques. The objective of this study is to investigate the effect of milling cutter tool geometry on cutting forces during thread milling. The proposed method can compare the performance of milling cutters in spite of the different number of tooth. The best thread milling cutter among the studied tools was determined from the cutting forces point of view. Furthermore, this study also pinpoints the best penetration strategy that provides minimum cutting forces. Lower cutting force variations will lead to fewer vibrations of the tool which in turn will produce accurate part.Postdoc de V Sharma financé par la région Bourgogn
Controlled bidirectional remote state preparation in noisy environment: A generalized view
It is shown that a realistic, controlled bidirectional remote state
preparation is possible using a large class of entangled quantum states having
a particular structure. Existing protocols of probabilistic, deterministic and
joint remote state preparation are generalized to obtain the corresponding
protocols of controlled bidirectional remote state preparation (CBRSP). A
general way of incorporating the effects of two well known noise processes, the
amplitude-damping and phase-damping noise, on the probabilistic CBRSP process
is studied in detail by considering that noise only affects the travel qubits
of the quantum channel used for the probabilistic CBRSP process. Also indicated
is how to account for the effect of these noise channels on deterministic and
joint remote state CBRSP protocols.Comment: 11 pages, 2 figure
Dissimilarity metric based on local neighboring information and genetic programming for data dissemination in vehicular ad hoc networks (VANETs)
This paper presents a novel dissimilarity metric based on local neighboring information
and a genetic programming approach for efficient data dissemination in Vehicular Ad Hoc Networks
(VANETs). The primary aim of the dissimilarity metric is to replace the Euclidean distance in
probabilistic data dissemination schemes, which use the relative Euclidean distance among vehicles
to determine the retransmission probability. The novel dissimilarity metric is obtained by applying a
metaheuristic genetic programming approach, which provides a formula that maximizes the Pearson
Correlation Coefficient between the novel dissimilarity metric and the Euclidean metric in several
representative VANET scenarios. Findings show that the obtained dissimilarity metric correlates with
the Euclidean distance up to 8.9% better than classical dissimilarity metrics. Moreover, the obtained
dissimilarity metric is evaluated when used in well-known data dissemination schemes, such as
p-persistence, polynomial and irresponsible algorithm. The obtained dissimilarity metric achieves
significant improvements in terms of reachability in comparison with the classical dissimilarity
metrics and the Euclidean metric-based schemes in the studied VANET urban scenarios
- …
