58 research outputs found

    Resource Allocation for Secure Gaussian Parallel Relay Channels with Finite-Length Coding and Discrete Constellations

    Full text link
    We investigate the transmission of a secret message from Alice to Bob in the presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes. Each link comprises a set of parallel channels, modeling for example an orthogonal frequency division multiplexing transmission. We consider the impact of discrete constellations and finite-length coding, defining an achievable secrecy rate under a constraint on the equivocation rate at Eve. Then we propose a power and channel allocation algorithm that maximizes the achievable secrecy rate by resorting to two coupled Gale-Shapley algorithms for stable matching problem. We consider the scenarios of both full and partial channel state information at Alice. In the latter case, we only guarantee an outage secrecy rate, i.e., the rate of a message that remains secret with a given probability. Numerical results are provided for Rayleigh fading channels in terms of average outage secrecy rate, showing that practical schemes achieve a performance quite close to that of ideal ones

    Loss tolerant device-independent quantum key distribution: a proof of principle

    Full text link
    We here present the rate analysis and a proof of principle realization of a device-independent quantum key distribution (QKD) protocol requiring the lowest detection efficiency necessary to achieve a secure key compared to device-independent protocols known so far. The protocol is based on non-maximally entangled state and its experimental realization has been performed by two-photon bipartite entangled states. The improvement with respect to protocols involving maximally entangled states has been estimated.Comment: 8 pages, 4 figure + appendi

    Low-power Secret-key Agreement over OFDM

    Get PDF
    Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplifies the design of the randomness sharing scheme, even in a fading channel scenario. We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information reconciliation. Numerical results confirm the merits of the proposed approach as a feasible and practical solution. Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19 April 201

    Location-Verification and Network Planning via Machine Learning Approaches

    Full text link
    In-region location verification (IRLV) in wireless networks is the problem of deciding if user equipment (UE) is transmitting from inside or outside a specific physical region (e.g., a safe room). The decision process exploits the features of the channel between the UE and a set of network access points (APs). We propose a solution based on machine learning (ML) implemented by a neural network (NN) trained with the channel features (in particular, noisy attenuation values) collected by the APs for various positions both inside and outside the specific region. The output is a decision on the UE position (inside or outside the region). By seeing IRLV as an hypothesis testing problem, we address the optimal positioning of the APs for minimizing either the area under the curve (AUC) of the receiver operating characteristic (ROC) or the cross entropy (CE) between the NN output and ground truth (available during the training). In order to solve the minimization problem we propose a twostage particle swarm optimization (PSO) algorithm. We show that for a long training and a NN with enough neurons the proposed solution achieves the performance of the Neyman-Pearson (N-P) lemma.Comment: Accepted for Workshop on Machine Learning for Communications, June 07 2019, Avignon, Franc

    High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities

    Get PDF
    The violation of Bell's inequality requires a well-designed experiment to validate the result. In experiments using energy-time and time-bin entanglement, initially proposed by Franson in 1989, there is an intrinsic loophole due to the high postselection. To obtain a violation in this type of experiment, a chained Bell inequality must be used. However, the local realism bound requires a high visibility in excess of 94.63 percent in the time-bin entangled state. In this work, we show how such a high visibility can be reached in order to violate a chained Bell inequality with 6, 8 and 10 terms.Comment: 8 pages, 4 figure

    Interference at the Single Photon Level Along Satellite-Ground Channels

    Get PDF
    Quantum interference arising from superposition of states is a striking evidence of the validity of Quantum Mechanics, confirmed in many experiments and also exploited in applications. However, as for any scientific theory, Quantum Mechanics is valid within the limits in which it has been experimentally verified. In order to extend such limits, it is necessary to observe quantum interference in unexplored conditions such as moving terminals at large distance in Space. Here we experimentally demonstrate single photon interference at a ground station due to the coherent superposition of two temporal modes reflected by a rapidly moving satellite thousand kilometers away. The relative speed of the satellite induces a varying modulation in the interference pattern. The measurement of the satellite distance in real time by laser ranging allowed us to precisely predict the instantaneous value of the interference phase. We then observed the interference patterns with visibility up to 67%67\% with three different satellites and with path length up to 5000 km. Our results attest the viability of photon temporal modes for fundamental tests of Physics and Quantum Communications in Space.Comment: Version accepted for publication in Phys. Rev. Let

    Postselection-loophole-free Bell violation with genuine time-bin entanglement

    Get PDF
    Entanglement is an invaluable resource for fundamental tests of physics and the implementation of quantum information protocols such as device-independent secure communications. In particular, time-bin entanglement is widely exploited to reach these purposes both in free-space and optical fiber propagation, due to the robustness and simplicity of its implementation. However, all existing realizations of time-bin entanglement suffer from an intrinsic postselection loophole, which undermines their usefulness. Here, we report the first experimental violation of Bell's inequality with "genuine" time-bin entanglement, free of the postselection loophole. We introduced a novel function of the interferometers at the two measurement stations, that operate as fast synchronized optical switches. This scheme allowed to obtain a postselection-loophole-free Bell violation of more than nine standard deviations. Since our scheme is fully implementable using standard fiber-based components and is compatible with modern integrated photonics, our results pave the way for the distribution of genuine time-bin entanglement over long distances.Comment: RevTe

    Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond

    Get PDF
    The fifth generation (5G) of cellular networks improves the precision of user localization and provides the means to disclose location information to over-the-top (OTT) service providers. The network data analytics function (NWDAF) can further elaborate this information at an aggregated level using artificial intelligence techniques. These powerful features may lead to the improper use of user location information by mobile network operators (MNOs) and OTT service providers. Moreover, vulnerabilities at various layers may also leak user location information to eavesdroppers. Hence, the privacy of users is likely at risk, as location is part of their sensitive data. In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals against location information leakage. Moreover, we advocate the continuous and detailed control of localization services by the user

    Extending Wheeler's delayed-choice experiment to Space

    Get PDF
    Gedankenexperiments have consistently played a major role in the development of quantum theory. A paradigmatic example is Wheeler's delayed-choice experiment, a wave-particle duality test that cannot be fully understood using only classical concepts. Here, we implement Wheeler's idea along a satellite-ground interferometer which extends for thousands of kilometers in Space. We exploit temporal and polarization degrees of freedom of photons reflected by a fast moving satellite equipped with retro-reflecting mirrors. We observed the complementary wave-like or particle-like behaviors at the ground station by choosing the measurement apparatus while the photons are propagating from the satellite to the ground. Our results confirm quantum mechanical predictions, demonstrating the need of the dual wave-particle interpretation, at this unprecedented scale. Our work paves the way for novel applications of quantum mechanics in Space links involving multiple photon degrees of freedom.Comment: 4 figure

    OMNICAM: Bifocal Panoramic Camera for Human and Robotic Exploration

    Get PDF
    Situational awareness is the key for maximizing the return of any operation, both for scientific and engineering assessments. SPACECLICK and INAF propose the OMNICAM, a novel camera system which can capture a 360° context view and an optically magnified portion of the same panorama with a single lens and sensor. The Bifocal Panoramic Lens (BPL) (designed by INAF researchers) is a lens capable of warping a panoramic Field-of-View (FoV) of 360° x 100° and simultaneously a round FoV of 20° in high-resolution. While the panoramic portion is always available for continuous monitoring surrounding environment, assets and ongoing operations, additionally the OMNICAM makes use of a pan/tilt mechanism to provide users of orientation capabilities for the magnified portion of the FoV
    corecore