3,710 research outputs found

    Secure Communication for Spatially Sparse Millimeter-Wave Massive MIMO Channels via Hybrid Precoding

    Get PDF
    In this paper, we investigate secure communication over sparse millimeter-wave (mm-Wave) massive multiple-input multiple-output (MIMO) channels by exploiting the spatial sparsity of legitimate user's channel. We propose a secure communication scheme in which information data is precoded onto dominant angle components of the sparse channel through a limited number of radio-frequency (RF) chains, while artificial noise (AN) is broadcast over the remaining nondominant angles interfering only with the eavesdropper with a high probability. It is shown that the channel sparsity plays a fundamental role analogous to secret keys in achieving secure communication. Hence, by defining two statistical measures of the channel sparsity, we analytically characterize its impact on secrecy rate. In particular, a substantial improvement on secrecy rate can be obtained by the proposed scheme due to the uncertainty, i.e., 'entropy', introduced by the channel sparsity which is unknown to the eavesdropper. It is revealed that sparsity in the power domain can always contribute to the secrecy rate. In contrast, in the angle domain, there exists an optimal level of sparsity that maximizes the secrecy rate. The effectiveness of the proposed scheme and derived results are verified by numerical simulations

    An Empirical Study of the I2P Anonymity Network and its Censorship Resistance

    Full text link
    Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of its structure through the Tor Metrics project. In contrast, I2P does not rely on centralized directory servers, and thus obtaining a complete view of the network is challenging. In this work, we conduct an empirical study of the I2P network, in which we measure properties including population, churn rate, router type, and the geographic distribution of I2P peers. We find that there are currently around 32K active I2P peers in the network on a daily basis. Of these peers, 14K are located behind NAT or firewalls. Using the collected network data, we examine the blocking resistance of I2P against a censor that wants to prevent access to I2P using address-based blocking techniques. Despite the decentralized characteristics of I2P, we discover that a censor can block more than 95% of peer IP addresses known by a stable I2P client by operating only 10 routers in the network. This amounts to severe network impairment: a blocking rate of more than 70% is enough to cause significant latency in web browsing activities, while blocking more than 90% of peer IP addresses can make the network unusable. Finally, we discuss the security consequences of the network being blocked, and directions for potential approaches to make I2P more resistant to blocking.Comment: 14 pages, To appear in the 2018 Internet Measurement Conference (IMC'18

    Legitimate against Illegitimate IRSs on MISO Wiretap Channels

    Full text link
    The low-cost legitimate intelligent reflecting surfaces (IRSs) are applied to the wiretap channel in physical layer security to enhance the secrecy rate. In practice, the eavesdropper can also deploy an IRS, namely illegitimate IRS, to deteriorate the secrecy rate. This paper studies the interplay between a transmitter, a legitimate IRS, and an illegitimate IRS in a multiple-input single-output (MISO) wiretap channel. We formulate a max-min secrecy rate problem, where all the information is available at the transmitter and the receivers. We aim to design an efficient transmit beamforming and phase shifting strategy of the legitimate IRS, under the worst-case secrecy rate achieved based on optimizing the phase-shifting strategy of the illegitimate IRS. We propose three solution methods based on the gradient descent ascent (GDA), the alternate optimization (AO), and the mixed Nash equilibrium (NE) in zero-sum games in strategic form. Simulation results show that for the continuous phase-shifting strategies, AO usually does not guarantee convergence, although it may achieve better performance than GDA in some iterations. GDA usually converges to a stationary point. Discrete phase-shifting strategies improve the convergence behavior of AO and GDA, while there is a single mixed NE with the highest secrecy rate.Comment: 2 figure

    Australian Legends: historical explorations of Australian masculinity and film 1970-1995.

    Get PDF
    The twin purpose of this research is to explore films as historically specific cultural texts, rather than representations of one historical moment, and to engage with historiographical debates surrounding representations of masculinity in Australian history. I do this to create a way of engaging with film and history where film is culturally representative of the past, not simply a depiction of a specific point in time. This study considers two films, George Miller's Mad Max (1979) and Stephan Elliot's The Adventures of Priscilla, Queen of the Desert (1994) to explore the relationship over time between violence, masking and landscape with the representation of performative masculinity in an Australian context

    A formal definition and a new security mechanism of physical unclonable functions

    Full text link
    The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms. A PUF is defined as a hardware device which implements a physical function with an output value that changes with its argument. A PUF can be clonable, but a secure PUF must be unclonable. This proposed meaning of a PUF is cleanly delineated from the closely related concepts of "conventional unclonable function", "physically obfuscated key", "random-number generator", "controlled PUF" and "strong PUF". The structure of a systematic security evaluation of a PUF enabled by the proposed formal definition is outlined. Practically all current and novel physical (but not conventional) unclonable physical functions are PUFs by our definition. Thereby the proposed definition captures the existing intuition about what is a PUF and remains flexible enough to encompass further research. In a second part we quantitatively characterize two classes of PUF security mechanisms, the standard one, based on a minimum secret read-out time, and a novel one, based on challenge-dependent erasure of stored information. The new mechanism is shown to allow in principle the construction of a "quantum-PUF", that is absolutely secure while not requiring the storage of an exponentially large secret. The construction of a PUF that is mathematically and physically unclonable in principle does not contradict the laws of physics.Comment: 13 pages, 1 figure, Conference Proceedings MMB & DFT 2012, Kaiserslautern, German

    A complex network perspective on clinical science

    Full text link
    Contemporary classification systems for mental disorders assume that abnormal behaviors are expressions of latent disease entities. An alternative to the latent disease model is the complex network approach. Instead of assuming that symptoms arise from an underlying disease entity, the complex network approach holds that disorders exist as systems of interrelated elements of a network. This approach also provides a framework for the understanding of therapeutic change. Depending on the structure of the network, change can occur abruptly once the network reaches a critical threshold (the tipping point). Homogeneous and highly connected networks often recover more slowly from local perturbations when the network approaches the tipping point, potentially making it possible to predict treatment change, relapse, and recovery. In this article, we discuss the complex network approach as an alternative to the latent disease model and its implications for classification, therapy, relapse, and recovery.R34 MH086668 - NIMH NIH HHS; R01 AT007257 - NCCIH NIH HHS; R21 MH101567 - NIMH NIH HHS; R34 MH099311 - NIMH NIH HHS; R21 MH102646 - NIMH NIH HHS; K23 MH100259 - NIMH NIH HHS; R01 MH099021 - NIMH NIH HH

    Satire As Confirmation Bias: South Park Meets The Simpsons

    Get PDF
    In this paper, I contrast The Simpsons and South Park to highlight how differing satirical strategies have the potential to spread disinformation through confirmation basis. The creators of South Park, Matt Stone and Trey Parker, employ a satirical strategy that does not seek approval or input from the objects of their satire. In contrast, the creator of The Simpsons, Matt Groening, seeks approval and agreement from the objects of their satire. Their different approaches to how they present their content to their audience coupled with the concepts of confirmation bias serve as yet another way for the possible spreading of disinformation. I argue that the difference between these satirical strategies can be defined using the terminology and conceptual frameworks of disinformation studies, namely, confirmation bias and theories of satire that highlight its potential to perpetrate disinformation.https://orb.binghamton.edu/research_days_posters_2023/1003/thumbnail.jp
    • 

    corecore