77 research outputs found

    Physical-layer counterattack strategies for the internet of bio-nano things with molecular communication

    Get PDF
    Molecular communication (MC) is an emerging new communication paradigm where information is conveyed by chemical signals. It has been recognized as one of the most promising physical layer techniques for the future Internet of Bio-Nano Things (IoBNT), which enables revolutionary applications beyond our imagination. Compared with conventional communication systems, MC typically demands a higher security level as the IoBNT is deeply associated with the biochemical process. Against this background, this article first discusses the security and privacy issues of IoBNT with MC. Then, the physical-layer countermeasures against the threat are presented from an interdisciplinary perspective concerning data science, signal processing techniques, and the biochemical properties of MC. Correspondingly, both the keyless and key-based schemes are conceived and revisited. Finally, some open research issues and future research directions for secrecy enhancement in IoBNT with MC are put forward.Engineering and Physical Sciences Research Council (EPSRC): EP/ X040518/1 and EP/V026763/

    Post-Quantum Key Exchange Protocols

    Full text link
    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.Comment: 11 pages, 2 figures. Submitted to SPIE DSS 2006; v2 citation typos fixed; v3 appendix typos correcte

    Secure information transport by transverse localization of light

    Get PDF
    A single-photon beating with itself can produce even the most elaborate optical fringe pattern. However, the large amount of information enclosed in such a pattern is typically inaccessible, since the complete distribution can be visualized only after many detections. In fact this limitation is only true for delocalized patterns. Here we demonstrate how reconfigurable localized optical patterns allow to encode up to 6 bits of information in disorder-induced high transmission channels, even using a small number of photon counts. We developed a quantum key distribution scheme for fiber communication in which high information capacity is achieved through position and momentum complementarity

    Privacy in wireless sensor networks using ring signature

    Get PDF
    AbstractThe veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table
    • …
    corecore