1,982,894 research outputs found
Recommended from our members
Military Attack
Dbyangs lo tells of the difficult times she faced when the village was attacked by the military in the 1950s.The fifty one audio and nine video files in this collection include: villages’ life stories, circle-dancing songs and performance, local history, folk tales, and interviews from Siyuewu Village, Puxi Township, Rangtang County, Aba Tibetan and Qiang Autonomous Prefecture, Sichuan Province, China.World Oral Literature Projec
Quantum secret sharing between multiparty and multiparty with four states
An protocol of quantum secret sharing between multiparty and multiparty with
four states is presented. We show that this protocol can make the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. In addition, we also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states.Comment: 7 page
Local Cyber-physical Attack with Leveraging Detection in Smart Grid
A well-designed attack in the power system can cause an initial failure and
then results in large-scale cascade failure. Several works have discussed power
system attack through false data injection, line-maintaining attack, and
line-removing attack. However, the existing methods need to continuously attack
the system for a long time, and, unfortunately, the performance cannot be
guaranteed if the system states vary. To overcome this issue, we consider a new
type of attack strategy called combinational attack which masks a line-outage
at one position but misleads the control center on line outage at another
position. Therefore, the topology information in the control center is
interfered by our attack. We also offer a procedure of selecting the vulnerable
lines of its kind. The proposed method can effectively and continuously deceive
the control center in identifying the actual position of line-outage. The
system under attack will be exposed to increasing risks as the attack
continuously. Simulation results validate the efficiency of the proposed attack
strategy.Comment: Accepted by IEEE SmartGridComm 201
Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum
In this paper, we introduce a strong adversarial attack, referred to as the
flipping attack, on Direct-Sequence Spread Spectrum (DSSS) systems. In this
attack, the attacker, which is appropriately positioned between the transmitter
and the receiver, instantaneously flips the transmitted symbols in the air at
50% rate, thereby driving the channel capacity to zero. Unlike the traditional
jamming attack, this attack, when perfectly executed, cannot be detected at the
receiver using signal-to-noise-ratio measurements. However, this attack
necessitates the attacker to perfectly know the realizations of all the
channels in the model. We first introduce the consequences of the flipping
attack on narrowband frequency-flat channels, and subsequently discuss its
feasibility in wideband frequency-selective channels. From the legitimate
users' perspective, we present a method to detect this attack and also propose
heuristics to improve the error-performance under the attack. We emphasize that
future cyber-physical systems that employ DSSS should design transceivers to
detect the proposed flipping attack, and then apply appropriate
countermeasures
- …
