4,207 research outputs found
A Secure Communication Game with a Relay Helping the Eavesdropper
In this work a four terminal complex Gaussian network composed of a source, a
destination, an eavesdropper and a jammer relay is studied under two different
set of assumptions: (i) The jammer relay does not hear the source transmission,
and (ii) The jammer relay is causally given the source message. In both cases
the jammer relay assists the eavesdropper and aims to decrease the achievable
secrecy rates. The source, on the other hand, aims to increase it. To help the
eavesdropper, the jammer relay can use pure relaying and/or send interference.
Each of the problems is formulated as a two-player, non-cooperative, zero-sum
continuous game. Assuming Gaussian strategies at the source and the jammer
relay in the first problem, the Nash equilibrium is found and shown to be
achieved with mixed strategies in general. The optimal cumulative distribution
functions (cdf) for the source and the jammer relay that achieve the value of
the game, which is the Nash equilibrium secrecy rate, are found. For the second
problem, the Nash equilibrium solution is found and the results are compared to
the case when the jammer relay is not informed about the source message.Comment: 13 pages, 11 figures, to appear in IEEE Transactions on Information
Forensics and Security, Special Issue on Using the Physical Layer for
Securing the Next Generation of Communication Systems. This is the journal
version of cs.IT:0911.008
Quantum advantages in classically defined tasks
We analyze classically defined games for which a quantum team has an
advantage over any classical team. The quantum team has a clear advantage in
games in which the players of each team are separated in space and the quantum
team can use unusually strong correlations of the Einstein-Podolsky-Rosen (EPR)
type. We present an example of a classically defined game played at one
location for which quantum players have a real advantage.Comment: 4 pages, revised version, to be published in PR
Quantum Games and Quantum Strategies
We investigate the quantization of non-zero sum games. For the particular
case of the Prisoners' Dilemma we show that this game ceases to pose a dilemma
if quantum strategies are allowed for. We also construct a particular quantum
strategy which always gives reward if played against any classical strategy.Comment: 4 pages, 4 figures, typographic sign error in the definition of the
operator J correcte
Political geographies of the object
This paper examines the role of objects in the constitution and exercise of state power, drawing on a close reading of the acclaimed HBO television series The Wire, an unconventional crime drama set and shot in Baltimore, Maryland. While political geography increasingly recognizes the prosaic and intimate practices of stateness, we argue that objects themselves are central to the production, organization, and performance of state power. Specifically, we analyze how three prominent objects on The Wire—wiretaps, cameras, and standardized tests—arrange and produce the conditions we understand as ‘stateness’. Drawing on object-oriented philosophy, we offer a methodology of power that suggests it is generalized force relations rather than specifically social relations that police a population—without, of course, ever being able to fully capture it. We conclude by suggesting The Wire itself is an object of force, and explore the implications of an object-oriented approach for understanding the nature of power, and for political geography more broadly
Adversarial Attacks and Defenses for Semantic Communication in Vehicular Metaverses
For vehicular metaverses, one of the ultimate user-centric goals is to
optimize the immersive experience and Quality of Service (QoS) for users on
board. Semantic Communication (SemCom) has been introduced as a revolutionary
paradigm that significantly eases communication resource pressure for vehicular
metaverse applications to achieve this goal. SemCom enables high-quality and
ultra-efficient vehicular communication, even with explosively increasing data
traffic among vehicles. In this article, we propose a hierarchical
SemCom-enabled vehicular metaverses framework consisting of the global
metaverse, local metaverses, SemCom module, and resource pool. The global and
local metaverses are brand-new concepts from the metaverse's distribution
standpoint. Considering the QoS of users, this article explores the potential
security vulnerabilities of the proposed framework. To that purpose, this study
highlights a specific security risk to the framework's SemCom module and offers
a viable defense solution, so encouraging community researchers to focus more
on vehicular metaverse security. Finally, we provide an overview of the open
issues of secure SemCom in the vehicular metaverses, notably pointing out
potential future research directions
- …