25,195 research outputs found

    Error Correction for Cooperative Data Exchange

    Full text link
    This paper considers the problem of error correction for a cooperative data exchange (CDE) system, where some clients are compromised or failed and send false messages. Assuming each client possesses a subset of the total messages, we analyze the error correction capability when every client is allowed to broadcast only one linearly-coded message. Our error correction capability bound determines the maximum number of clients that can be compromised or failed without jeopardizing the final decoding solution at each client. We show that deterministic, feasible linear codes exist that can achieve the derived bound. We also evaluate random linear codes, where the coding coefficients are drawn randomly, and then develop the probability for a client to withstand a certain number of compromised or failed peers and successfully deduce the complete message for any network size and any initial message distributions

    Beyond Bitcoin: Issues in Regulating Blockchain Transactions

    Get PDF
    The buzz surrounding Bitcoin has reached a fever pitch. Yet in academic legal discussions, disproportionate emphasis is placed on bitcoins (that is, virtual currency), and little mention is made of blockchain technology—the true innovation behind the Bitcoin protocol. Simply, blockchain technology solves an elusive networking problem by enabling “trustless” transactions: value exchanges over computer networks that can be verified, monitored, and enforced without central institutions (for example, banks). This has broad implications for how we transact over electronic networks. This Note integrates current research from leading computer scientists and cryptographers to elevate the legal community’s understanding of blockchain technology and, ultimately, to inform policymakers and practitioners as they consider different regulatory schemes. An examination of the economic properties of a blockchain-based currency suggests the technology’s true value lies in its potential to facilitate more efficient digital-asset transfers. For example, applications of special interest to the legal community include more efficient document and authorship verification, title transfers, and contract enforcement. Though a regulatory patchwork around virtual currencies has begun to form, its careful analysis reveals much uncertainty with respect to these alternative applications

    Multi-Level Steganography: Improving Hidden Communication in Networks

    Full text link
    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions has several potential benefits. The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important benefit is that the lower-layer method may be used as a signalling channel in which to exchange information that affects the way that the upper-level method functions, thus possibly making the steganographic communication harder to detect. The prototype of MLS for IP networks was also developed, and the experimental results are included in this paper.Comment: 18 pages, 13 figure

    Vehicle to vehicle (V2V) wireless communications

    Get PDF
    This work focuses on the vehicle-to-vehicle (V2V) communication, its current challenges, future perspective and possible improvement.V2V communication is characterized by the dynamic environment, high mobility, nonpredective scenario, propagation effects, and also communicating antenna's positions. This peculiarity of V2V wireless communication makes channel modelling and the vehicular propagation quite challenging. In this work, firstly we studied the present context of V2V communication also known as Vehicular Ad-hoc Netwok (VANET) including ongoing researches and studies particularly related to Dedicated Short Range Communication (DSRC), specifically designed for automotive uses with corresponding set of protocols and standards. Secondly, we focused on communication models and improvement of these models to make them more suitable, reliable and efficient for the V2V environment. As specifies the standard, OFDM is used in V2V communication, Adaptable OFDM transceiver was designed. Some parameters as performance analytics are used to compare the improvement with the actual situation. For the enhancement of physical layer of V2V communication, this work is focused in the study of MIMO channel instead of SISO. In the designed transceiver both SISO and MIMO were implemented and studied successfully

    Defining and Regulating Cryptocurrency: Fake Internet Money or Legitimate Medium of Exchange?

    Get PDF
    Digitalization makes almost everything quicker, sleeker, and more efficient. Many argue cryptocurrency is the future of money and payment transfers. This paper explores how the unique nature of cryptocurrencies creates barriers to a strict application of traditional regulatory strategies. Indeed, state and federal regulators remain uncertain if and how they can regulate this cutting-edge technology. Cryptocurrency businesses face difficulty navigating the unclear regulatory landscape, and consumers frequently fall prey to misinformation. To reconcile these concerns, this paper asserts cryptocurrency functions as “currency” or “money” and should be treated as such for regulatory purposes. It also proposes each state implement a uniform cryptocurrency-specific framework following the Uniform Regulation of Virtual-Currency Business Act. Such a harmonious approach would reduce compliance costs for cryptocurrency businesses, protect consumers, and provide satisfactory state and federal oversight

    Covert Ephemeral Communication in Named Data Networking

    Full text link
    In the last decade, there has been a growing realization that the current Internet Protocol is reaching the limits of its senescence. This has prompted several research efforts that aim to design potential next-generation Internet architectures. Named Data Networking (NDN), an instantiation of the content-centric approach to networking, is one such effort. In contrast with IP, NDN routers maintain a significant amount of user-driven state. In this paper we investigate how to use this state for covert ephemeral communication (CEC). CEC allows two or more parties to covertly exchange ephemeral messages, i.e., messages that become unavailable after a certain amount of time. Our techniques rely only on network-layer, rather than application-layer, services. This makes our protocols robust, and communication difficult to uncover. We show that users can build high-bandwidth CECs exploiting features unique to NDN: in-network caches, routers' forwarding state and name matching rules. We assess feasibility and performance of proposed cover channels using a local setup and the official NDN testbed

    Local flexibility market design for aggregators providing multiple flexibility services at distribution network level

    Get PDF
    This paper presents a general description of local flexibility markets as a market-based management mechanism for aggregators. The high penetration of distributed energy resources introduces new flexibility services like prosumer or community self-balancing, congestion management and time-of-use optimization. This work is focused on the flexibility framework to enable multiple participants to compete for selling or buying flexibility. In this framework, the aggregator acts as a local market operator and supervises flexibility transactions of the local energy community. Local market participation is voluntary. Potential flexibility stakeholders are the distribution system operator, the balance responsible party and end-users themselves. Flexibility is sold by means of loads, generators, storage units and electric vehicles. Finally, this paper presents needed interactions between all local market stakeholders, the corresponding inputs and outputs of local market operation algorithms from participants and a case study to highlight the application of the local flexibility market in three scenarios. The local market framework could postpone grid upgrades, reduce energy costs and increase distribution grids’ hosting capacity.Postprint (published version
    • 

    corecore