58 research outputs found
Resource Allocation for Secure Gaussian Parallel Relay Channels with Finite-Length Coding and Discrete Constellations
We investigate the transmission of a secret message from Alice to Bob in the
presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes.
Each link comprises a set of parallel channels, modeling for example an
orthogonal frequency division multiplexing transmission. We consider the impact
of discrete constellations and finite-length coding, defining an achievable
secrecy rate under a constraint on the equivocation rate at Eve. Then we
propose a power and channel allocation algorithm that maximizes the achievable
secrecy rate by resorting to two coupled Gale-Shapley algorithms for stable
matching problem. We consider the scenarios of both full and partial channel
state information at Alice. In the latter case, we only guarantee an outage
secrecy rate, i.e., the rate of a message that remains secret with a given
probability. Numerical results are provided for Rayleigh fading channels in
terms of average outage secrecy rate, showing that practical schemes achieve a
performance quite close to that of ideal ones
Loss tolerant device-independent quantum key distribution: a proof of principle
We here present the rate analysis and a proof of principle realization of a
device-independent quantum key distribution (QKD) protocol requiring the lowest
detection efficiency necessary to achieve a secure key compared to
device-independent protocols known so far. The protocol is based on
non-maximally entangled state and its experimental realization has been
performed by two-photon bipartite entangled states. The improvement with
respect to protocols involving maximally entangled states has been estimated.Comment: 8 pages, 4 figure + appendi
Low-power Secret-key Agreement over OFDM
Information-theoretic secret-key agreement is perhaps the most practically
feasible mechanism that provides unconditional security at the physical layer
to date. In this paper, we consider the problem of secret-key agreement by
sharing randomness at low power over an orthogonal frequency division
multiplexing (OFDM) link, in the presence of an eavesdropper. The low power
assumption greatly simplifies the design of the randomness sharing scheme, even
in a fading channel scenario. We assess the performance of the proposed system
in terms of secrecy key rate and show that a practical approach to key sharing
is obtained by using low-density parity check (LDPC) codes for information
reconciliation. Numerical results confirm the merits of the proposed approach
as a feasible and practical solution. Moreover, the outage formulation allows
to implement secret-key agreement even when only statistical knowledge of the
eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper
with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot
Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19
April 201
Location-Verification and Network Planning via Machine Learning Approaches
In-region location verification (IRLV) in wireless networks is the problem of
deciding if user equipment (UE) is transmitting from inside or outside a
specific physical region (e.g., a safe room). The decision process exploits the
features of the channel between the UE and a set of network access points
(APs). We propose a solution based on machine learning (ML) implemented by a
neural network (NN) trained with the channel features (in particular, noisy
attenuation values) collected by the APs for various positions both inside and
outside the specific region. The output is a decision on the UE position
(inside or outside the region). By seeing IRLV as an hypothesis testing
problem, we address the optimal positioning of the APs for minimizing either
the area under the curve (AUC) of the receiver operating characteristic (ROC)
or the cross entropy (CE) between the NN output and ground truth (available
during the training). In order to solve the minimization problem we propose a
twostage particle swarm optimization (PSO) algorithm. We show that for a long
training and a NN with enough neurons the proposed solution achieves the
performance of the Neyman-Pearson (N-P) lemma.Comment: Accepted for Workshop on Machine Learning for Communications, June 07
2019, Avignon, Franc
High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities
The violation of Bell's inequality requires a well-designed experiment to
validate the result. In experiments using energy-time and time-bin
entanglement, initially proposed by Franson in 1989, there is an intrinsic
loophole due to the high postselection. To obtain a violation in this type of
experiment, a chained Bell inequality must be used. However, the local realism
bound requires a high visibility in excess of 94.63 percent in the time-bin
entangled state. In this work, we show how such a high visibility can be
reached in order to violate a chained Bell inequality with 6, 8 and 10 terms.Comment: 8 pages, 4 figure
Interference at the Single Photon Level Along Satellite-Ground Channels
Quantum interference arising from superposition of states is a striking
evidence of the validity of Quantum Mechanics, confirmed in many experiments
and also exploited in applications. However, as for any scientific theory,
Quantum Mechanics is valid within the limits in which it has been
experimentally verified. In order to extend such limits, it is necessary to
observe quantum interference in unexplored conditions such as moving terminals
at large distance in Space. Here we experimentally demonstrate single photon
interference at a ground station due to the coherent superposition of two
temporal modes reflected by a rapidly moving satellite thousand kilometers
away. The relative speed of the satellite induces a varying modulation in the
interference pattern. The measurement of the satellite distance in real time by
laser ranging allowed us to precisely predict the instantaneous value of the
interference phase. We then observed the interference patterns with visibility
up to with three different satellites and with path length up to 5000
km. Our results attest the viability of photon temporal modes for fundamental
tests of Physics and Quantum Communications in Space.Comment: Version accepted for publication in Phys. Rev. Let
Postselection-loophole-free Bell violation with genuine time-bin entanglement
Entanglement is an invaluable resource for fundamental tests of physics and
the implementation of quantum information protocols such as device-independent
secure communications. In particular, time-bin entanglement is widely exploited
to reach these purposes both in free-space and optical fiber propagation, due
to the robustness and simplicity of its implementation. However, all existing
realizations of time-bin entanglement suffer from an intrinsic postselection
loophole, which undermines their usefulness. Here, we report the first
experimental violation of Bell's inequality with "genuine" time-bin
entanglement, free of the postselection loophole. We introduced a novel
function of the interferometers at the two measurement stations, that operate
as fast synchronized optical switches. This scheme allowed to obtain a
postselection-loophole-free Bell violation of more than nine standard
deviations. Since our scheme is fully implementable using standard fiber-based
components and is compatible with modern integrated photonics, our results pave
the way for the distribution of genuine time-bin entanglement over long
distances.Comment: RevTe
Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond
The fifth generation (5G) of cellular networks improves the precision of user localization and provides the means to disclose location information to over-the-top (OTT) service providers. The network data analytics function (NWDAF) can further elaborate this information at an aggregated level using artificial intelligence techniques. These powerful features may lead to the improper use of user location information by mobile network operators (MNOs) and OTT service providers. Moreover, vulnerabilities at various layers may also leak user location information to eavesdroppers. Hence, the privacy of users is likely at risk, as location is part of their sensitive data. In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals against location information leakage. Moreover, we advocate the continuous and detailed control of localization services by the user
Extending Wheeler's delayed-choice experiment to Space
Gedankenexperiments have consistently played a major role in the development
of quantum theory. A paradigmatic example is Wheeler's delayed-choice
experiment, a wave-particle duality test that cannot be fully understood using
only classical concepts. Here, we implement Wheeler's idea along a
satellite-ground interferometer which extends for thousands of kilometers in
Space. We exploit temporal and polarization degrees of freedom of photons
reflected by a fast moving satellite equipped with retro-reflecting mirrors. We
observed the complementary wave-like or particle-like behaviors at the ground
station by choosing the measurement apparatus while the photons are propagating
from the satellite to the ground. Our results confirm quantum mechanical
predictions, demonstrating the need of the dual wave-particle interpretation,
at this unprecedented scale. Our work paves the way for novel applications of
quantum mechanics in Space links involving multiple photon degrees of freedom.Comment: 4 figure
OMNICAM: Bifocal Panoramic Camera for Human and Robotic Exploration
Situational awareness is the key for maximizing the return of any operation, both for scientific and engineering assessments. SPACECLICK and INAF propose the OMNICAM, a novel camera system which can capture a 360° context view and an optically magnified portion of the same panorama with a single lens and sensor. The Bifocal Panoramic Lens (BPL) (designed by INAF researchers) is a lens capable of warping a panoramic Field-of-View (FoV) of 360° x 100° and simultaneously a round FoV of 20° in high-resolution. While the panoramic portion is always available for continuous monitoring surrounding environment, assets and ongoing operations, additionally the OMNICAM makes use of a pan/tilt mechanism to provide users of orientation capabilities for the magnified portion of the FoV
- …