84 research outputs found
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
A compact bandpass filter using microstrip hairpin resonator for WLAN applications
This work represents a microstrip hairpin resonator-based bandpass filter for Wireless Local Area Network (WLAN). Two short-circuited microstrip comb-lines have been coupled at the two sides of a rectangular-loop to construct the hairpin resonator. The Taconic TLX-8 material has been used as the substrate to design the filter at a center frequency of 2.45 GHz. The designed filter exhibits a two-pole Chebyshev response with an insertion loss of -0.37 dB and a minimum return loss of -34.03 dB. This compact filter has a fractional bandwidth of 4.37% which sharply selects the entire bandwidth of WLAN frequencies
Using SAT solvers to finding short cycles in cryptographic algorithms
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and nonlinear feedback shift registers (NLFSR) and their combination. It is currently known how to construct LFSR to generate a bit sequence with a maximum period, but there is no such knowledge in the case of NLFSR. The latter would be useful in cryptography application (to have a few taps and relatively low algebraic degree). In this article, we propose a simple method based on the generation of algebraic equations to describe iterated cryptographic algorithms and find their solutions using an SAT solver to exclude short cycles in algorithms such as stream ciphers or nonlinear feedback shift register (NLFSR). Thanks to the use of AIG graphs, it is also possible to fully automate our algorithm, and the results of its operation are comparable to the results obtained by manual generation of equations. We present also the results of experiments in which we successfully found short cycles in the NLFSRs used in KSG, Grain-80, Grain-128 and Grain-128a stream ciphers and also in stream ciphers Bivium and Trivium (without constants used in the initialization step)
NOVEL SIMPLE DESIGN AND ANALYSIS OF WI-MAX TRANSCEIVER USING MATLAB-SIMULINK
This paper provides analysis of WiMAX systems from its background to their architectures highlighting merits and demerits, topologies, structures and looks deep into transceiver systems architecture, then specializes on the radio frequency (RF) front-end part of the WiMAX transceiver system in which a model is designed. Thereafter, the model is implemented in MATLAB Simulink and the results are investigated and analyzed
- …