53 research outputs found

    Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Get PDF
    The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop

    Internet of Things: an Applied Research on Automation for Lock Shield

    Get PDF
    This study presents results obtained in applied research, involving controller boards (Arduino), at the Nove de Julho higher education institution, in the courses of Computer Science in São Paulo. In 2018, focusing mainly on the positive and negative points presented by the statistical data of the public security office. The methodology used to obtain the data was experimental research based on results obtained in the newspaper Estadão of June 25, 2017. Every hour, a house is invaded in the State of São Paulo, according to data of the Public Security Secretariat, focusing mainly in the qualitative and quantitative results, seeking greater security for homes with tilting gates, avoiding fraud and cloning of locks. Creating new automation equipment, focused on security, its assembly is more complex and more structured than the simple control boards and controls for swing gates. Thus obtaining a safer drive with a high power against fraud, since the system is mounted on top of the controller boards (Arduino), this system achieved a higher degree of reliability than conventional systems

    The Topology Stability of Vehicular Ad Hoc Network

    Get PDF
    Abstract: The goal of this paper is to look for relatively stable area in the Vehicular Ad hoc Network (VANET), thereby helping for developing more stable routing protocols. We built a theoretical model to analysis the stability of the VANET topology, and provided the simulation experiment to verify the correctness of the theoretical analysis. Results show that the vehicle traveling in the same direction is easier to maintain the stability of the topology of a VANET, and the valid time of the path will decrease with the increase of the intersection angle in the direction of the vehicle movement, the vehicle movement velocity and the time. In addition, the simulation results also show that the bigger the initial distance among the vehicles is, the less stable the network topology is. The discovery of this phenomenon is important to develop zoned routing protocols

    Including general environmental effects in K-factor approximation for rice-distributed VANET channels

    Full text link
    © 2014. This paper presents a method of approximating the Rician K-factor based on the instantaneous static environment. The strongest signal propagation paths are resolved in order to determine specular and diffuse powers for approximation. The model is experimentally validated in two different urban areas in New South Wales, Australia. Good agreement between the model and experimental data was obtained over short-range communication links, demonstrating the suitability of the model in urban VANETs. The paper concludes with recommendations for methods to account for vehicles in the simulation and incorporating additional phenomena (such as scattering) in the approximation

    Analysis of cyber risk and associated concentration of research (ACR)² in the security of vehicular edge clouds

    Get PDF
    Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS. Security has been identified as one of the greatest challenges for the ITS, and security measures require consideration from design to implementation. This work focuses on providing an analysis of cyber risk and associated concentration of research (ACR2). The introduction of ACR2 approach can be used to consider research challenges in VEC and open up further investigation into those threats that are important but under-researched. That is, the approach can identify very high or high risk areas that have a low research concentration. In this way, this research can lay the foundations for the development of further work in securing the future of ITS

    Denial of Service Attack in VANET: A Survey

    Get PDF
    ABSTRACT--

    RSVconf: Node Autoconfiguration for MANETs

    Full text link
    Abstract — A Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links, which can form an arbitrary topology. We have worked on a new protocol, RSVconf, to ensure the IP address self-configuration of MANETs, with a special focus on the ITS (Intelligent Transportation System) context which is indeed the most mobile scenario. The RSVconf protocol manages the creation, merger and re-merger (merger after part of the network temporarily separated) of networks at IP layer. It is stateful, distributed and routing independent. The simulation results show its capability to react fast and correctly to the rapid topology changes of mobile networks without a waste of bandwidth. In this paper we present the current status of our research, open aspects and future directions
    • …
    corecore