14,377 research outputs found
Alibi framework for identifying reactive jamming nodes in wireless LAN
Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. We propose a novel approach to identifying the reactive jamming nodes in wireless LAN (WLAN). We rely on the half-duplex nature of nodes: they cannot transmit and receive at the same time. Thus, if a compromised node jams a packet, it cannot guess the content of the jammed packet. More importantly, if an honest node receives a jammed packet, it can prove that it cannot be the one jamming the packet by showing the content of the packet. Such proofs of jammed packets are called "alibis" - the key concept of our approach.
In this paper, we present an alibi framework to deal with reactive jamming nodes in WLAN. We propose a concept of alibi-safe topologies on which our proposed identification algorithms are proved to correctly identify the attackers. We further propose a realistic protocol to implement the identification algorithm. The protocol includes a BBC-based timing channel for information exchange under the jamming situation and a similarity hashing technique to reduce the storage and network overhead. The framework is evaluated in a realistic TOSSIM simulation where the simulation characteristics and parameters are based on real traces on our small-scale MICAz test-bed. The results show that in reasonable dense networks, the alibi framework can accurately identify both non-colluding and colluding reactive jamming nodes. Therefore, the alibi approach is a very promising approach to deal with reactive jamming nodes.published or submitted for publicationnot peer reviewe
Shear jamming, discontinuous shear thickening, and fragile states in dry granular materials under oscillatory shear
We numerically study the linear response of two-dimensional frictional
granular materials under oscillatory shear. The storage modulus and the
loss modulus in the zero strain rate limit depend on the initial strain
amplitude of the oscillatory shear before measurement. The shear jammed state
(satisfying ) can be observed at an amplitude greater than a critical
initial strain amplitude. The fragile state is defined by the emergence of
liquid-like and solid-like states depending on the form of the initial shear.
In this state, the observed after the reduction of the strain amplitude
depends on the phase of the external shear strain. The loss modulus
exhibits a discontinuous jump corresponding to discontinuous shear thickening
in the fragile state
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Models for Metal Hydride Particle Shape, Packing, and Heat Transfer
A multiphysics modeling approach for heat conduction in metal hydride powders
is presented, including particle shape distribution, size distribution,
granular packing structure, and effective thermal conductivity. A statistical
geometric model is presented that replicates features of particle size and
shape distributions observed experimentally that result from cyclic hydride
decreptitation. The quasi-static dense packing of a sample set of these
particles is simulated via energy-based structural optimization methods. These
particles jam (i.e., solidify) at a density (solid volume fraction) of
0.665+/-0.015 - higher than prior experimental estimates. Effective thermal
conductivity of the jammed system is simulated and found to follow the behavior
predicted by granular effective medium theory. Finally, a theory is presented
that links the properties of bi-porous cohesive powders to the present systems
based on recent experimental observations of jammed packings of fine powder.
This theory produces quantitative experimental agreement with metal hydride
powders of various compositions.Comment: 12 pages, 12 figures, 2 table
Softening and Yielding of Soft Glassy Materials
Solids deform and fluids flow, but soft glassy materials, such as emulsions,
foams, suspensions, and pastes, exhibit an intricate mix of solid and
liquid-like behavior. While much progress has been made to understand their
elastic (small strain) and flow (infinite strain) properties, such
understanding is lacking for the softening and yielding phenomena that connect
these asymptotic regimes. Here we present a comprehensive framework for
softening and yielding of soft glassy materials, based on extensive numerical
simulations of oscillatory rheological tests, and show that two distinct
scenarios unfold depending on the material's packing density. For dense
systems, there is a single, pressure-independent strain where the elastic
modulus drops and the particle motion becomes diffusive. In contrast, for
weakly jammed systems, a two-step process arises: at an intermediate softening
strain, the elastic and loss moduli both drop down and then reach a new plateau
value, whereas the particle motion becomes diffusive at the distinctly larger
yield strain. We show that softening is associated with an extensive number of
microscopic contact changes leading to a non-analytic rheological signature.
Moreover, the scaling of the softening strain with pressure suggest the
existence of a novel pressure scale above which softening and yielding
coincide, and we verify the existence of this crossover scale numerically. Our
findings thus evidence the existence of two distinct classes of soft glassy
materials -- jamming dominated and dense -- and show how these can be
distinguished by their rheological fingerprint.Comment: 9 pages, 11 figures, to appear in Soft Matte
A Method against Interrupted-Sampling Repeater Jamming Based on Energy Function Detection and Band-Pass Filtering
Interrupted-sampling repeater jamming (ISRJ) is a new kind of coherent jamming to the large time-bandwidth linear frequency modulation (LFM) signal. Many jamming modes, such as lifelike multiple false targets and dense false targets, can be made through setting up different parameters. According to the “storage-repeater-storage-repeater” characteristics of the ISRJ and the differences in the time-frequency-energy domain between the ISRJ signal and the target echo signal, one new method based on the energy function detection and band-pass filtering is proposed to suppress the ISRJ. The methods mainly consist of two parts: extracting the signal segments without ISRJ and constructing band-pass filtering function with low sidelobe. The simulation results show that the method is effective in the ISRJ with different parameters
Conduction in jammed systems of tetrahedra
Control of transport processes in composite microstructures is critical to
the development of high performance functional materials for a variety of
energy storage applications. The fundamental process of conduction and its
control through the manipulation of granular composite attributes (e.g., grain
shape) are the subject of this work. We show that athermally jammed packings of
tetrahedra with ultra-short range order exhibit fundamentally different
pathways for conduction than those in dense sphere packings. Highly resistive
granular constrictions and few face-face contacts between grains result in
short-range distortions from the mean temperature field. As a consequence,
'granular' or differential effective medium theory predicts the conductivity of
this media within 10% at the jamming point; in contrast, strong enhancement of
transport near interparticle contacts in packed-sphere composites results in
conductivity divergence at the jamming onset. The results are expected to be
particularly relevant to the development of nanomaterials, where nanoparticle
building blocks can exhibit a variety of faceted shapes.Comment: 9 pages, 10 figure
- …