3,603 research outputs found

    Quantum Cryptography

    Get PDF
    Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    MULTI_LEVEL SECURE FROM WEB INTRUSION AND QUERY ATTACKS ON WEB DATABASE

    Get PDF
    Most data frameworks and business applications assembled these days have a web frontend and they should be generally accessible to customers, representatives and accomplices around the globe, as the computerized economy is turning out to be increasingly pervasive in the worldwide economy. Strategy and a model instrument to assess web application security components. In this paper, we along these lines propose to make trusted equipment a top notch national in the safe information administration field. Additionally, we trust that cost-driven bits of knowledge and compositional standards will generally change the way frameworks and calculations are planned. We present an outsourced database model that permits customers to execute SQL questions with security and under administrative consistence imperatives by utilizing server-facilitated, sealed trusted equipment in basic inquiry preparing stages, along these lines expelling any confinements on the kind of bolstered inquiries

    IoT-Based Multi-Dimensional Chaos Mapping System for Secure and Fast Transmission of Visual Data in Smart Cities

    Get PDF
    A “smart city” sends data from many sensors to a cloud server for local authorities and the public to connect. Smart city residents communicate mostly through images and videos. Many image security algorithms have been proposed to improve locals’ lives, but a high-class redundancy method with a small space requirement is still needed to acquire and protect this sensitive data. This paper proposes an IoT-based multi-dimensional chaos mapping system for secure and fast transmission of visual data in smart cities, which uses the five dimensional Gauss Sine Logistic system to generate hyper-chaotic sequences to encrypt images. The proposed method also uses pixel position permutation and Singular Value Decomposition with Discrete fractional cosine transform to compress and protect the sensitive image data. To increase security, we use a chaotic system to construct the chaotic sequences and a diffusion matrix. Furthermore, numerical simulation results and theoretical evaluations validate the suggested scheme’s security and efficacy after compression encryption.publishedVersio

    Vehicular Visible Light Communications

    Get PDF
    Vehicular communications are foreseen to play a key role to increase road safety and realize autonomous driving. In addition to the radio frequency (RF)-based dedicated short range communication (DSRC) and long-term evolution (LTE) communication technologies, vehicular visible light communication (V2LC) is proposed as a complementary solution, utilizing readily deployed vehicle light emitting diode (LED) lights as transmitter with image sensors such as photodetector (PD) and camera as the receivers. V2LC fundamentals including transmitter and receiver characteristics with dimming capabilities are reviewed in this chapter. Depending on the field measurements using off-the-shelf automotive LED light, communication constraints are demonstrated. Moreover, considering the line-of-sight (LoS) characteristics, security aspects of V2LC is compared with the DSRC for a practical vehicle-to-vehicle (V2V) communication scenario. Finally, superiority of V2LC in terms of communication security with the proposed SecVLC method is demonstrated through simulation results

    Photonics and Web Engineering: WILGA 2009

    Get PDF
    The paper is a digest of work presented during a cyclic Ph.D. student symposium on Photonics and Web Engineering WILGA 2009. The subject of WILGA are Photonics Applications in Astronomy, Communications, Industry and High-Energy Physics Experiments. WILGA is sponsored by EuCARD Project. Symposium is organized by ISE PW in cooperation with professional organizations IEEE, SPIE, PSP and KEiT PAN. There are presented mainly Ph.D. and M.Sc. theses as well as achievements of young researchers. These papers, presented in such a big number, more than 250 in some years, are in certain sense a good digest of the condition of academic research capabilities in this branch of science and technology. The undertaken research subjects for Ph.D. theses in electronics is determined by the interest and research capacity (financial, laboratory and intellectual) of the young researchers and their tutors. Basically, the condition of academic electronics research depends on financing coming from applications areas. During Wilga 2009 there were organized, and thus the paper debates, the following topical essions concerning applications of advanced electronics and photonics systems: merging of electronic systems and photonics, Internet engineering, distributed easurement systems, security in information technology, astronomy and space echnology, HEP experiments, environment protection, image processing and iometry. The paper contains also more general remarks concerning the workshops organized by and for the Ph.D. students in advanced photonics and electronics systems. WILGA Symposium used to have several dedicated sessions on EU FP6 CARE Project and now on EU FP7 EuCARD Project. Papers are presented on E-XFEL, FLASH, accelerator timing, LLRF systems and criosystems

    Community Lynching and the US Asthma Epidemic

    Get PDF
    We explore the implications of IR Cohen's work on immune cognition for understanding rising rates of asthma morbidity and mortality in the US. Immune cognition is inherently linked with central nervous system cognition, and with the cognitive function of the embedding sociocultural networks by which individuals are acculturated and through which they work with others to meet challenges of threat and opportunity. Externally-imposed patterns of 'structured stress' can, through their effect on a child's socioculture, become synergistic with the development of immune cognition, triggering the persistence of an atopic Th2 phenotype, a necessary precursor to asthma and other immune diseases. Structured stress in the US particularly includes the cross sectional and longitudinal effects of a systematic destruction of minority urban communities occurring since the end of World War II which we characterize as community lynching. Reversal of the rising tide of asthma and related chronic diseases in the US thus seems unlikely without a 21st Century version of the earlier Great Urban Reforms which ended the scourge of infectious diseases, in particular an end to the de-facto ethnic cleansing of minority neighborhoo
    • …
    corecore