111,601 research outputs found
A No-go theorem for device-independent security in relativistic causal theories
A crucial task for secure communication networks is to determine the minimum
of physical requirements to certify a cryptographic protocol. A widely accepted
candidate for certification is the principle of relativistic causality which is
equivalent to the disallowance of causal loops. Contrary to expectations, we
demonstrate how correlations allowed by relativistic causality could be
exploited to break security for a broad class of multi-party protocols (all
modern protocols belong to this class). As we show, deep roots of this dramatic
lack of security lies in the fact that unlike in previous (quantum or
no-signaling) scenarios the new theory "decouples" the property of extremality
and that of statistical independence on environment variables. Finally, we find
out, that the lack of security is accompanied by some advantage: the new
correlations can reduce communication complexity better than the no-signaling
ones. As a tool for analysis of this advantage, we characterize relativistic
causal polytope by its extremal points in the simplest multi-party scenario
that goes beyond the no-signaling paradigm
A land mobile satellite data system
The Telesat Mobile Incorporated (TMI) Mobile Data System (MDS) was developed to apply satellite technology to the transportation industry's requirement for a fleet management system. It will provide two-way messaging and automatic position reporting capabilities between dispatch centers and customers' fleets of trucks. The design was based on the Inmarsat L-Band space segment with system link parameters and margins adjusted to meet the land mobile satellite channel characteristics. The system interfaces with the Teleglobe Des Laurentides earth station at Weir, Quebec. The signaling protocols were derived from the Inmarsat Standard C packet signalling system with unique trucking requirements incorporated where necessary
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case
One of the most challenging fields in vehicular communications has been the
experimental assessment of protocols and novel technologies. Researchers
usually tend to simulate vehicular scenarios and/or partially validate new
contributions in the area by using constrained testbeds and carrying out minor
tests. In this line, the present work reviews the issues that pioneers in the
area of vehicular communications and, in general, in telematics, have to deal
with if they want to perform a good evaluation campaign by real testing. The
key needs for a good experimental evaluation is the use of proper software
tools for gathering testing data, post-processing and generating relevant
figures of merit and, finally, properly showing the most important results. For
this reason, a key contribution of this paper is the presentation of an
evaluation environment called AnaVANET, which covers the previous needs. By
using this tool and presenting a reference case of study, a generic testing
methodology is described and applied. This way, the usage of the IPv6 protocol
over a vehicle-to-vehicle routing protocol, and supporting IETF-based network
mobility, is tested at the same time the main features of the AnaVANET system
are presented. This work contributes in laying the foundations for a proper
experimental evaluation of vehicular networks and will be useful for many
researchers in the area.Comment: in EAI Endorsed Transactions on Industrial Networks and Intelligent
Systems, 201
Low-complexity medium access control protocols for QoS support in third-generation radio access networks
One approach to maximizing the efficiency of
medium access control (MAC) on the uplink in a future wideband
code-division multiple-access (WCDMA)-based third-generation
radio access network, and hence maximize spectral efficiency,
is to employ a low-complexity distributed scheduling control
approach. The maximization of spectral efficiency in third-generation
radio access networks is complicated by the need to
provide bandwidth-on-demand to diverse services characterized
by diverse quality of service (QoS) requirements in an interference
limited environment. However, the ability to exploit the full
potential of resource allocation algorithms in third-generation
radio access networks has been limited by the absence of a metric
that captures the two-dimensional radio resource requirement,
in terms of power and bandwidth, in the third-generation radio
access network environment, where different users may have
different signal-to-interference ratio requirements. This paper
presents a novel resource metric as a solution to this fundamental
problem. Also, a novel deadline-driven backoff procedure has
been presented as the backoff scheme of the proposed distributed
scheduling MAC protocols to enable the efficient support of
services with QoS imposed delay constraints without the need
for centralized scheduling. The main conclusion is that low-complexity
distributed scheduling control strategies using overload
avoidance/overload detection can be designed using the proposed
resource metric to give near optimal performance and thus maintain
a high spectral efficiency in third-generation radio access
networks and that importantly overload detection is superior to
overload avoidance
Options for Securing RTP Sessions
The Real-time Transport Protocol (RTP) is used in a large number of
different application domains and environments. This heterogeneity
implies that different security mechanisms are needed to provide
services such as confidentiality, integrity, and source
authentication of RTP and RTP Control Protocol (RTCP) packets
suitable for the various environments. The range of solutions makes
it difficult for RTP-based application developers to pick the most
suitable mechanism. This document provides an overview of a number
of security solutions for RTP and gives guidance for developers on
how to choose the appropriate security mechanism
De-ossifying the Internet Transport Layer : A Survey and Future Perspectives
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher PD
MIRAI Architecture for Heterogeneous Network
One of the keywords that describe next-generation wireless communications is "seamless." As part of the e-Japan Plan promoted by the Japanese Government, the Multimedia Integrated Network by Radio Access Innovation project has as its goal the development of new technologies to enable seamless integration of various wireless access systems for practical use by 2005. This article describes a heterogeneous network architecture including a common tool, a common platform, and a common access. In particular, software-defined radio technologies are used to develop a multiservice user terminal to access different wireless networks. The common platform for various wireless networks is based on a wireless-supporting IPv6 network. A basic access network, separated from other wireless access networks, is used as a means for wireless system discovery, signaling, and paging. A proof-of-concept experimental demonstration system is available
- …