1,468 research outputs found
Secure Layered Transmission in Multicast Systems with Wireless Information and Power Transfer
This paper considers downlink multicast transmit beamforming for secure
layered transmission systems with wireless simultaneous information and power
transfer. We study the power allocation algorithm design for minimizing the
total transmit power in the presence of passive eavesdroppers and energy
harvesting receivers. The algorithm design is formulated as a non-convex
optimization problem. Our problem formulation promotes the dual use of energy
signals in providing secure communication and facilitating efficient energy
transfer. Besides, we take into account a minimum required power for energy
harvesting at the idle receivers and heterogeneous quality of service (QoS)
requirements for the multicast video receivers. In light of the intractability
of the problem, we reformulate the considered problem by replacing a non-convex
probabilistic constraint with a convex deterministic constraint. Then, a
semidefinite programming relaxation (SDR) approach is adopted to obtain an
upper solution for the reformulated problem. Subsequently, sufficient
conditions for the global optimal solution of the reformulated problem are
revealed. Furthermore, we propose two suboptimal power allocation schemes based
on the upper bound solution. Simulation results demonstrate the excellent
performance and significant transmit power savings achieved by the proposed
schemes compared to isotropic energy signal generation.Comment: 7 pages, 3 figures, accepted for presentation at the IEEE
International Conference on Communications (ICC), Sydney, Australia, 201
Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer
This paper considers a basic MIMO information-energy (I-E) broadcast system,
where a multi-antenna transmitter transmits information and energy
simultaneously to a multi-antenna information receiver and a dual-functional
multi-antenna energy receiver which is also capable of decoding information.
Due to the open nature of wireless medium and the dual purpose of information
and energy transmission, secure information transmission while ensuring
efficient energy harvesting is a critical issue for such a broadcast system.
Assuming that physical layer security techniques are applied to the system to
ensure secure transmission from the transmitter to the information receiver, we
study beamforming design to maximize the achievable secrecy rate subject to a
total power constraint and an energy harvesting constraint. First, based on
semidefinite relaxation, we propose global optimal solutions to the secrecy
rate maximization (SRM) problem in the single-stream case and a specific
full-stream case where the difference of Gram matrices of the channel matrices
is positive semidefinite. Then, we propose a simple iterative algorithm named
inexact block coordinate descent (IBCD) algorithm to tackle the SRM problem of
general case with arbitrary number of streams. We proves that the IBCD
algorithm can monotonically converge to a Karush-Kuhn-Tucker (KKT) solution to
the SRM problem. Furthermore, we extend the IBCD algorithm to the joint
beamforming and artificial noise design problem. Finally, simulations are
performed to validate the performance of the proposed beamforming algorithms.Comment: Submitted to journal for possible publication. First submission to
arXiv Mar. 14 201
End-to-end security in active networks
Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea
Recommended from our members
Multimedia delivery in the future internet
The term âNetworked Mediaâ implies that all kinds of media including text, image, 3D graphics, audio
and video are produced, distributed, shared, managed and consumed on-line through various networks,
like the Internet, Fiber, WiFi, WiMAX, GPRS, 3G and so on, in a convergent manner [1]. This white
paper is the contribution of the Media Delivery Platform (MDP) cluster and aims to cover the Networked
challenges of the Networked Media in the transition to the Future of the Internet.
Internet has evolved and changed the way we work and live. End users of the Internet have been confronted
with a bewildering range of media, services and applications and of technological innovations concerning
media formats, wireless networks, terminal types and capabilities. And there is little evidence that the pace
of this innovation is slowing. Today, over one billion of users access the Internet on regular basis, more
than 100 million users have downloaded at least one (multi)media file and over 47 millions of them do so
regularly, searching in more than 160 Exabytes1 of content. In the near future these numbers are expected
to exponentially rise. It is expected that the Internet content will be increased by at least a factor of 6, rising
to more than 990 Exabytes before 2012, fuelled mainly by the users themselves. Moreover, it is envisaged
that in a near- to mid-term future, the Internet will provide the means to share and distribute (new)
multimedia content and services with superior quality and striking flexibility, in a trusted and personalized
way, improving citizensâ quality of life, working conditions, edutainment and safety.
In this evolving environment, new transport protocols, new multimedia encoding schemes, cross-layer inthe
network adaptation, machine-to-machine communication (including RFIDs), rich 3D content as well as
community networks and the use of peer-to-peer (P2P) overlays are expected to generate new models of
interaction and cooperation, and be able to support enhanced perceived quality-of-experience (PQoE) and
innovative applications âon the moveâ, like virtual collaboration environments, personalised services/
media, virtual sport groups, on-line gaming, edutainment. In this context, the interaction with content
combined with interactive/multimedia search capabilities across distributed repositories, opportunistic P2P
networks and the dynamic adaptation to the characteristics of diverse mobile terminals are expected to
contribute towards such a vision.
Based on work that has taken place in a number of EC co-funded projects, in Framework Program 6 (FP6)
and Framework Program 7 (FP7), a group of experts and technology visionaries have voluntarily
contributed in this white paper aiming to describe the status, the state-of-the art, the challenges and the way
ahead in the area of Content Aware media delivery platforms
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
A Method for Securing Symmetric Keys for Internet of Things Enabled Distributed Data Systems
This study introduces an innovative method for securing symmetric keys in Internet of Things (IoT)-enabled distributed data systems, focusing on enhancing data security while optimizing encryption and decryption times. Through a comprehensive analysis of various encryption algorithmsâTEA, XTEA, BLOCK TEA (XXTEA), and the proposed NTSA algorithmâacross different key sizes and file sizes, we aim to demonstrate the significant improvements our method offers over existing techniques. Our research meticulously evaluated the performance of these algorithms, employing random variations to encryption and decryption times to simulate real-world variability and assess the algorithms' efficiency and security robustness. The findings reveal that the NTSA algorithm, in particular, showcases superior performance, offering an approximate improvement of 10% to 15% in encryption and decryption times over traditional methods such as TEA and XTEA, and an even more considerable enhancement compared to BLOCK TEA (XXTEA). The key contribution of this study lies in its provision of a secure, efficient framework for symmetric key encryption in IoT-enabled distributed environments. By optimizing key size and algorithm selection, our method not only secures data against potential cyber threats but also ensures high-speed data processingâa critical requirement in the IoT domain where the volume of data transactions and the need for real-time processing are ever-increasing. The proposed method significantly advances the field of data security in distributed systems, especially within the context of the burgeoning IoT landscape. It underscores the importance of algorithmic efficiency and strategic key management in bolstering the security and performance of modern digital ecosystems
- âŠ