988 research outputs found
A Note on the Information-Theoretic-(in)Security of Fading Generated Secret Keys
In this work we explore the security of secret keys generated via the
electromagnetic reciprocity of the wireless fading channel. Identifying a new
sophisticated colluding attack, we explore the information-theoretic-security
for such keys in the presence of an all-powerful adversary constrained only by
the laws of quantum mechanics. Specifically, we calculate the reduction in the
conditional mutual information between transmitter and receiver that can occur
when an adversary with unlimited computational and communication resources
places directional antenna interceptors at chosen locations. Such locations, in
principal, can be arbitrarily far from the intended receiver yet still
influence the secret key rate.Comment: 4 pages, 2 figures. This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessibl
The Quantum Car
I explore the use of quantum information as a security enabler for the future
driverless vehicle. Specifically, I investigate the role combined classical and
quantum information can have on the most important characteristic of the
driverless vehicle paradigm - the vehicle location. By using
information-theoretic verification frameworks, coupled with emerging
quantum-based location-verification procedures, I show how vehicle positions
can be authenticated with a probability of error simply not attainable in
classical-only networks. I also discuss how other quantum applications can be
seamlessly encapsulated within the same vehicular communication infrastructure
required for location verification. The two technology enablers required for
the driverless quantum vehicle are an increase in current quantum memory
timescales (likely) and wide-scale deployment of classical vehicular
communication infrastructure (underway). I argue the enhanced safety features
delivered by the `Quantum Car' mean its eventual deployment is inevitable.Comment: 4 pages, 1 figur
Indoor wireless communications and applications
Chapter 3 addresses challenges in radio link and system design in indoor scenarios. Given the fact that most human activities take place in indoor environments, the need for supporting ubiquitous indoor data connectivity and location/tracking service becomes even more important than in the previous decades. Specific technical challenges addressed in this section are(i), modelling complex indoor radio channels for effective antenna deployment, (ii), potential of millimeter-wave (mm-wave) radios for supporting higher data rates, and (iii), feasible indoor localisation and tracking techniques, which are summarised in three dedicated sections of this chapter
Development of a Model and Localization Algorithm for Received Signal Strength-Based Geolocation
Location-Based Services (LBS), also called geolocation, have become increasingly popular in the past decades. They have several uses ranging from assisting emergency personnel, military reconnaissance and applications in social media. In geolocation a group of sensors estimate the location of transmitters using position and Radio Frequency (RF) information. A review of the literature revealed that a majority of the Received Signal Strength (RSS) techniques used made erroneous assumptions about the distribution or ignored effects of multiple transmitters, noise and multiple antennas. Further, the corresponding algorithms are often mathematically complex and computationally expensive. To address the issues this dissertation focused on RSS models which account for external factors effects and algorithms that are more efficient and accurate
- …