14,377 research outputs found

    Alibi framework for identifying reactive jamming nodes in wireless LAN

    Get PDF
    Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. We propose a novel approach to identifying the reactive jamming nodes in wireless LAN (WLAN). We rely on the half-duplex nature of nodes: they cannot transmit and receive at the same time. Thus, if a compromised node jams a packet, it cannot guess the content of the jammed packet. More importantly, if an honest node receives a jammed packet, it can prove that it cannot be the one jamming the packet by showing the content of the packet. Such proofs of jammed packets are called "alibis" - the key concept of our approach. In this paper, we present an alibi framework to deal with reactive jamming nodes in WLAN. We propose a concept of alibi-safe topologies on which our proposed identification algorithms are proved to correctly identify the attackers. We further propose a realistic protocol to implement the identification algorithm. The protocol includes a BBC-based timing channel for information exchange under the jamming situation and a similarity hashing technique to reduce the storage and network overhead. The framework is evaluated in a realistic TOSSIM simulation where the simulation characteristics and parameters are based on real traces on our small-scale MICAz test-bed. The results show that in reasonable dense networks, the alibi framework can accurately identify both non-colluding and colluding reactive jamming nodes. Therefore, the alibi approach is a very promising approach to deal with reactive jamming nodes.published or submitted for publicationnot peer reviewe

    Shear jamming, discontinuous shear thickening, and fragile states in dry granular materials under oscillatory shear

    Get PDF
    We numerically study the linear response of two-dimensional frictional granular materials under oscillatory shear. The storage modulus GG' and the loss modulus GG'' in the zero strain rate limit depend on the initial strain amplitude of the oscillatory shear before measurement. The shear jammed state (satisfying G>0G'>0) can be observed at an amplitude greater than a critical initial strain amplitude. The fragile state is defined by the emergence of liquid-like and solid-like states depending on the form of the initial shear. In this state, the observed GG' after the reduction of the strain amplitude depends on the phase of the external shear strain. The loss modulus GG'' exhibits a discontinuous jump corresponding to discontinuous shear thickening in the fragile state

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Models for Metal Hydride Particle Shape, Packing, and Heat Transfer

    Full text link
    A multiphysics modeling approach for heat conduction in metal hydride powders is presented, including particle shape distribution, size distribution, granular packing structure, and effective thermal conductivity. A statistical geometric model is presented that replicates features of particle size and shape distributions observed experimentally that result from cyclic hydride decreptitation. The quasi-static dense packing of a sample set of these particles is simulated via energy-based structural optimization methods. These particles jam (i.e., solidify) at a density (solid volume fraction) of 0.665+/-0.015 - higher than prior experimental estimates. Effective thermal conductivity of the jammed system is simulated and found to follow the behavior predicted by granular effective medium theory. Finally, a theory is presented that links the properties of bi-porous cohesive powders to the present systems based on recent experimental observations of jammed packings of fine powder. This theory produces quantitative experimental agreement with metal hydride powders of various compositions.Comment: 12 pages, 12 figures, 2 table

    Softening and Yielding of Soft Glassy Materials

    Full text link
    Solids deform and fluids flow, but soft glassy materials, such as emulsions, foams, suspensions, and pastes, exhibit an intricate mix of solid and liquid-like behavior. While much progress has been made to understand their elastic (small strain) and flow (infinite strain) properties, such understanding is lacking for the softening and yielding phenomena that connect these asymptotic regimes. Here we present a comprehensive framework for softening and yielding of soft glassy materials, based on extensive numerical simulations of oscillatory rheological tests, and show that two distinct scenarios unfold depending on the material's packing density. For dense systems, there is a single, pressure-independent strain where the elastic modulus drops and the particle motion becomes diffusive. In contrast, for weakly jammed systems, a two-step process arises: at an intermediate softening strain, the elastic and loss moduli both drop down and then reach a new plateau value, whereas the particle motion becomes diffusive at the distinctly larger yield strain. We show that softening is associated with an extensive number of microscopic contact changes leading to a non-analytic rheological signature. Moreover, the scaling of the softening strain with pressure suggest the existence of a novel pressure scale above which softening and yielding coincide, and we verify the existence of this crossover scale numerically. Our findings thus evidence the existence of two distinct classes of soft glassy materials -- jamming dominated and dense -- and show how these can be distinguished by their rheological fingerprint.Comment: 9 pages, 11 figures, to appear in Soft Matte

    A Method against Interrupted-Sampling Repeater Jamming Based on Energy Function Detection and Band-Pass Filtering

    Get PDF
    Interrupted-sampling repeater jamming (ISRJ) is a new kind of coherent jamming to the large time-bandwidth linear frequency modulation (LFM) signal. Many jamming modes, such as lifelike multiple false targets and dense false targets, can be made through setting up different parameters. According to the “storage-repeater-storage-repeater” characteristics of the ISRJ and the differences in the time-frequency-energy domain between the ISRJ signal and the target echo signal, one new method based on the energy function detection and band-pass filtering is proposed to suppress the ISRJ. The methods mainly consist of two parts: extracting the signal segments without ISRJ and constructing band-pass filtering function with low sidelobe. The simulation results show that the method is effective in the ISRJ with different parameters

    Conduction in jammed systems of tetrahedra

    Full text link
    Control of transport processes in composite microstructures is critical to the development of high performance functional materials for a variety of energy storage applications. The fundamental process of conduction and its control through the manipulation of granular composite attributes (e.g., grain shape) are the subject of this work. We show that athermally jammed packings of tetrahedra with ultra-short range order exhibit fundamentally different pathways for conduction than those in dense sphere packings. Highly resistive granular constrictions and few face-face contacts between grains result in short-range distortions from the mean temperature field. As a consequence, 'granular' or differential effective medium theory predicts the conductivity of this media within 10% at the jamming point; in contrast, strong enhancement of transport near interparticle contacts in packed-sphere composites results in conductivity divergence at the jamming onset. The results are expected to be particularly relevant to the development of nanomaterials, where nanoparticle building blocks can exhibit a variety of faceted shapes.Comment: 9 pages, 10 figure
    corecore