6,369 research outputs found

    The challenge of detecting intracluster filaments with Faraday Rotation

    Get PDF
    The detection of filaments in the cosmic web will be crucial to distinguish between the possible magnetogenesis scenarios and future large polarization surveys will be able to shed light on their magnetization level. In this work, we use numerical simulations of galaxy clusters to investigate their possible detection. We compute the Faraday Rotation signal in intracluster filaments and compare it to its surrounding environment. We find that the expected big improvement in sensitivity with the SKA-MID will in principle allow the detection of a large fraction of filaments surrounding galaxy clusters. However, the contamination of the intrinsic Faraday Rotation of background polarized sources will represent a big limiter to the number of objects that can be significantly detected. We discuss possible strategies to minimize this effect and increase the chances of detection of the cosmic web with the large statistics expected from future surveys.Comment: 16 pages, accepted to Galaxie

    A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks

    Full text link
    Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, we propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles, that is, the inherent differences among transmission channels. The proposed technique is based on scrambling of groups of consecutive packets and does not need the use of an initial authentication nor automatic repeat request protocols. We present a modification of the scrambling circuits included in the IEEE 802.11g standard which allows for a suitable error propagation at the unauthorized receiver, thus achieving physical layer security.Comment: 9 pages, 7 figures. Accepted for publication in IEEE Wireless Communications Letters. Copyright transferred to IEE

    Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes

    Full text link
    We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems. The use of LDPC codes in this context allows to achieve good security levels with very compact keys, which is an important advantage over the classical McEliece cryptosystem based on Goppa codes. However, only regular LDPC codes have been considered up to now, while some further improvement can be achieved by using irregular LDPC codes, which are known to achieve better error correction performance than regular LDPC codes. This is shown in this paper, for the first time at our knowledge. The possible use of irregular transformation matrices is also investigated, which further increases the efficiency of the system, especially in regard to the public key size.Comment: 6 pages, 3 figures, presented at ISCC 201

    LDPC coded transmissions over the Gaussian broadcast channel with confidential messages

    Full text link
    We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the wiretap channel. In order to design and assess practical coding schemes, we use the error rate as a metric of the performance achieved by the authorized receiver (Bob) and the unauthorized receiver (Eve). We study the system feasibility, and show that two different levels of protection against noise are required on the public and the secret messages. This can be achieved in two ways: i) by using LDPC codes with unequal error protection (UEP) of the transmitted information bits or ii) by using two classical non-UEP LDPC codes with different rates. We compare these two approaches and show that, for the considered examples, the solution exploiting UEP LDPC codes is more efficient than that using non-UEP LDPC codes.Comment: 5 pages, 5 figures, to be presented at IEEE ICT 201

    AONT-LT: a Data Protection Scheme for Cloud and Cooperative Storage Systems

    Full text link
    We propose a variant of the well-known AONT-RS scheme for dispersed storage systems. The novelty consists in replacing the Reed-Solomon code with rateless Luby transform codes. The resulting system, named AONT-LT, is able to improve the performance by dispersing the data over an arbitrarily large number of storage nodes while ensuring limited complexity. The proposed solution is particularly suitable in the case of cooperative storage systems. It is shown that while the AONT-RS scheme requires the adoption of fragmentation for achieving widespread distribution, thus penalizing the performance, the new AONT-LT scheme can exploit variable length codes which allow to achieve very good performance and scalability.Comment: 6 pages, 8 figures, to be presented at the 2014 High Performance Computing & Simulation Conference (HPCS 2014) - Workshop on Security, Privacy and Performance in Cloud Computin

    Distributed Observer Analysis and Design

    Get PDF
    A Distributed observer design is described for estimating the state of a continuous-time, input free, linear system. This thesis explains how to construct the local estimators, which comprise the observer inputs and outputs, and it is shown which are the requirements to deal with this structure. Every agent senses an output signal from the system and distributes it across a fixed-time network to its neighbors. The information flow increases the capability of each agent to estimate the state of the system and uses collaboration to improve the quality of data. The proposed solution has several positive features compared to recent results in the literature, which include milder assumptions on the network connectivity and the maximum dimension of the state of each observer does not exceed the order of the plant. The conditions are reduced to certain detectability requirements for each cluster of agents in the network, where a cluster is identified as a subset of agents that satisfy specific properties. Instead, the dimension of each observer is reduced to the number of possible observable states of the system, collected by the agent and by the neighbors

    On the astronomical origin of the Hallstatt oscillation found in radiocarbon and climate records throughout the Holocene

    Full text link
    An oscillation with a period of about 2100-2500 years, the Hallstatt cycle, is found in cosmogenic radioisotopes (C-14 and Be-10) and in paleoclimate records throughout the Holocene. Herein we demonstrate the astronomical origin of this cycle. Namely, this oscillation is coherent to the major stable resonance involving the four Jovian planets - Jupiter, Saturn, Uranus and Neptune - whose period is p=2318 yr. The Hallstatt cycle could derive from the rhythmic variation of the circularity of the solar system disk assuming that this dynamics could eventually modulate the solar wind and, consequently, the incoming cosmic ray flux and/or the interplanetary/cosmic dust concentration around the Earth-Moon system. The orbit of the planetary mass center (PMC) relative to the Sun is used as a proxy. We analyzed how the instantaneous eccentricity vector of this virtual orbit varies from 13,000 B. C. to 17,000 A. D.. We found that it undergoes kind of pulsations as it clearly presents rhythmic contraction and expansion patterns with a 2318 yr period together with a number of already known faster oscillations associated to the planetary orbital stable resonances. We found that a fast expansion of the Sun-PMC orbit followed by a slow contraction appears to prevent cosmic rays to enter within the system inner region while a slow expansion followed by a fast contraction favors it. Similarly, the same dynamics could modulate the amount of interplanetary/cosmic dust falling on Earth. These would then cause both the radionucleotide production and climate change by means of a cloud/albedo modulation. Other stable orbital resonance frequencies (e.g. at periods of 20 yr, 45 yr, 60 yr, 85 yr, 159-171-185 yr, etc.) are found in radionucleotide, solar, aurora and climate records, as determined in the scientific literature. Thus, the result supports a planetary theory of solar and/or climate variation.Comment: 36 pages, 14 figures, 1 tabl

    Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages

    Full text link
    The broadcast channel with confidential messages is a well studied scenario from the theoretical standpoint, but there is still lack of practical schemes able to achieve some fixed level of reliability and security over such a channel. In this paper, we consider a quasi-static fading channel in which both public and private messages must be sent from the transmitter to the receivers, and we aim at designing suitable coding and modulation schemes to achieve such a target. For this purpose, we adopt the error rate as a metric, by considering that reliability (security) is achieved when a sufficiently low (high) error rate is experienced at the receiving side. We show that some conditions exist on the system feasibility, and that some outage probability must be tolerated to cope with the fading nature of the channel. The proposed solution exploits low-density parity-check codes with unequal error protection, which are able to guarantee two different levels of protection against noise for the public and the private information, in conjunction with different modulation schemes for the public and the private message bits.Comment: 6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on Wireless Physical Layer Securit

    Interlocking directorates and different power forms: An explorative analysis in the Italian context

    Get PDF
    The purpose of the present paper is twofold. The first is to update the contribution by Drago et al. (2011) about cross-shareholdings and interlocking directorates in Italian listed companies (FTSE MIB) to 31 December 2016 and to reinforce theory of enlarged collusion. The second is to find how interlocking directorates can contribute to understanding the power structure. By using the social network analysis, we map the network structure of interlocking boards and employ centrality measures like degree, eigenvector and betweenness centrality along with the network density and average degree. We interpret eigenvector centrality as a measure of “effective power” of the connections because it can be seen as a weighted sum of not only direct connections but indirect connections, while betweenness centrality as a measure of “potential power” because it is a proxy of the volume of information that passes through the nodes. In this way, we provide a framework for selecting Italian firms with effective and potential power – around whom interactions and processes can be traced and analysed. In addition, we find that the position assumed by the controlling group of the Mediobanca Galaxy is definitely downsized

    Low-power Secret-key Agreement over OFDM

    Get PDF
    Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplifies the design of the randomness sharing scheme, even in a fading channel scenario. We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information reconciliation. Numerical results confirm the merits of the proposed approach as a feasible and practical solution. Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19 April 201
    corecore