53 research outputs found
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
The imperative need for unconditional secure key exchange is expounded by the
increasing connectivity of networks and by the increasing number and level of
sophistication of cyberattacks. Two concepts that are information theoretically
secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise
(KLJN). However, these concepts require a dedicated connection between hosts in
peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A
practical and cost effective method is to have each host share their respective
cable(s) with other hosts such that two remote hosts can realize a secure key
exchange without the need of an additional cable or key exchanger. In this
article we analyze the cost complexities of cable, key exchangers, and time
required in the star network. We mentioned the reliability of the star network
and compare it with other network geometries. We also conceived a protocol and
equation for the number of secure bit exchange periods needed in a star
network. We then outline other network geometries and trade-off possibilities
that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop
Internet of Things: an Applied Research on Automation for Lock Shield
This study presents results obtained in applied research, involving controller boards (Arduino), at the Nove de Julho higher education institution, in the courses of Computer Science in São Paulo. In 2018, focusing mainly on the positive and negative points presented by the statistical data of the public security office. The methodology used to obtain the data was experimental research based on results obtained in the newspaper Estadão of June 25, 2017. Every hour, a house is invaded in the State of São Paulo, according to data of the Public Security Secretariat, focusing mainly in the qualitative and quantitative results, seeking greater security for homes with tilting gates, avoiding fraud and cloning of locks. Creating new automation equipment, focused on security, its assembly is more complex and more structured than the simple control boards and controls for swing gates. Thus obtaining a safer drive with a high power against fraud, since the system is mounted on top of the controller boards (Arduino), this system achieved a higher degree of reliability than conventional systems
The Topology Stability of Vehicular Ad Hoc Network
Abstract: The goal of this paper is to look for relatively stable area in the Vehicular Ad hoc Network (VANET), thereby helping for developing more stable routing protocols. We built a theoretical model to analysis the stability of the VANET topology, and provided the simulation experiment to verify the correctness of the theoretical analysis. Results show that the vehicle traveling in the same direction is easier to maintain the stability of the topology of a VANET, and the valid time of the path will decrease with the increase of the intersection angle in the direction of the vehicle movement, the vehicle movement velocity and the time. In addition, the simulation results also show that the bigger the initial distance among the vehicles is, the less stable the network topology is. The discovery of this phenomenon is important to develop zoned routing protocols
Including general environmental effects in K-factor approximation for rice-distributed VANET channels
© 2014. This paper presents a method of approximating the Rician K-factor based on the instantaneous static environment. The strongest signal propagation paths are resolved in order to determine specular and diffuse powers for approximation. The model is experimentally validated in two different urban areas in New South Wales, Australia. Good agreement between the model and experimental data was obtained over short-range communication links, demonstrating the suitability of the model in urban VANETs. The paper concludes with recommendations for methods to account for vehicles in the simulation and incorporating additional phenomena (such as scattering) in the approximation
Analysis of cyber risk and associated concentration of research (ACR)² in the security of vehicular edge clouds
Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS. Security has been identified as one of the greatest challenges for the ITS, and security measures require consideration from design to implementation. This work focuses on providing an analysis of cyber risk and associated concentration of research (ACR2). The introduction of ACR2 approach can be used to consider research challenges in VEC and open up further investigation into those threats that are important but under-researched. That is, the approach can identify very high or high risk areas that have a low research concentration. In this way, this research can lay the foundations for the development of further work in securing the future of ITS
RSVconf: Node Autoconfiguration for MANETs
Abstract — A Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links, which can form an arbitrary topology. We have worked on a new protocol, RSVconf, to ensure the IP address self-configuration of MANETs, with a special focus on the ITS (Intelligent Transportation System) context which is indeed the most mobile scenario. The RSVconf protocol manages the creation, merger and re-merger (merger after part of the network temporarily separated) of networks at IP layer. It is stateful, distributed and routing independent. The simulation results show its capability to react fast and correctly to the rapid topology changes of mobile networks without a waste of bandwidth. In this paper we present the current status of our research, open aspects and future directions
- …