3,536 research outputs found

    Toward designing a quantum key distribution network simulation model

    Get PDF
    As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator

    QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator

    Get PDF
    The applications of quantum information science move towards bigger and better dimensions for the next generation technology. In the field of quantum cryptography and quantum computation, the world already witnessed various groundbreaking tangible products and promising results. Quantum cryptography is one of the mature fields of quantum mechanics and the devices are already available in the markets. In order to reach the heights of digital cryptography, the current state of quantum cryptography is still under various researches. However, the complexity of quantum cryptography is high due to combination of hardware and software. The lack of effective simulation tool to design and analyze the quantum cryptography experiments delays the reaching distance of the success. Therefore, in this paper, a framework to achieve an effective single photon based quantum cryptography simulation tool is proposed. The limitations of a commercial photonic simulation tool based experiments are also highlighted. Finally, the ideas for achieving one-stop simulation package for quantum based secure key distribution experiments are discussed. The proposed modules of simulation framework have been analyzed from the programming perspective

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    A Framework for Incorporating Serious Games into Learning Object Repositories through Experiential Learning

    Get PDF
    A learning environment Galore seamlessly combining serious games with generative learning objects based on experiential learning model is described. The learning object repository in Galore allows domain experts to elucidate knowledge concepts using parameterized learning objects in diverse formats such as text, visuals, interactive widgets, as well as embedded gamelets to provide a learning experience customized to student learning preferences. Reflective observation and abstract conceptualization zones are explicitly modeled to support the exploratory phases of the experiential learning model. The metadata associated with the knowledge components in the environment are used to develop algorithms that automatically retrieve and synthesize lesson plans for students to achieve a specified set of learning objectives. We illustrate Galore through a case study for secure quantum internet protocols using Python Jupyter notebooks. A total of 28 notebooks and 16 gamelets using Galore cover the foundations of secure quantum internet protocols

    Philosophical Aspects of Quantum Information Theory

    Get PDF
    Quantum information theory represents a rich subject of discussion for those interested in the philosphical and foundational issues surrounding quantum mechanics for a simple reason: one can cast its central concerns in terms of a long-familiar question: How does the quantum world differ from the classical one? Moreover, deployment of the concepts of information and computation in novel contexts hints at new (or better) means of understanding quantum mechanics, and perhaps even invites re-assessment of traditional material conceptions of the basic nature of the physical world. In this paper I review some of these philosophical aspects of quantum information theory, begining with an elementary survey of the theory, seeking to highlight some of the principles and heuristics involved. We move on to a discussion of the nature and definition of quantum information and deploy the findings in discussing the puzzles surrounding teleportation. The final two sections discuss, respectively, what one might learn from the development of quantum computation (both about the nature of quantum systems and about the nature of computation) and consider the impact of quantum information theory on the traditional foundational questions of quantum mechanics (treating of the views of Zeilinger, Bub and Fuchs, amongst others).Comment: LaTeX; 55pp; 3 figs. Forthcoming in Rickles (ed.) The Ashgate Companion to the New Philosophy of Physic

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper
    corecore