WorldWideScience

Sample records for vehicular communications security

  1. Secure Communication in Vehicular Networks - PRESERVE Demo

    NARCIS (Netherlands)

    Lagana, M.; Feiri, Michael; Sall, M.; Lange, M.; Tomatis, A.; Papadimitratos, P.

    2012-01-01

    Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The near-deployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality

  2. On the Security of Millimeter Wave Vehicular Communication Systems Using Random Antenna Subsets

    KAUST Repository

    Eltayeb, Mohammed E.

    2017-03-20

    Millimeter wave (mmWave) vehicular communication systems have the potential to improve traffic efficiency and safety. Lack of secure communication links, however, may lead to a formidable set of abuses and attacks. To secure communication links, a physical layer precoding technique for mmWave vehicular communication systems is proposed in this paper. The proposed technique exploits the large dimensional antenna arrays available at mmWave systems to produce direction dependent transmission. This results in coherent transmission to the legitimate receiver and artificial noise that jams eavesdroppers with sensitive receivers. Theoretical and numerical results demonstrate the validity and effectiveness of the proposed technique and show that the proposed technique provides high secrecy throughput when compared to conventional array and switched array transmission techniques.

  3. Reputation systems and secure communication in vehicular networks

    OpenAIRE

    Antolino Rivas, David

    2013-01-01

    A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing so, they constrain the ad-hoc nature of the VANET imposing a frequent connection to the CA to retrieve the Certificate Revocation List (CRL) and requiring some degree of roadside infrastructure to achieve that connection. Other solutions propose the usage of group signatur...

  4. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  5. Current technologies in vehicular communication

    CERN Document Server

    Dimitrakopoulos, George

    2017-01-01

    This book provides a concise and comprehensive overview of vehicular communication technologies. It classifies all relevant standards, protocols and applications, so as to enable the reader to gain a holistic approach towards the subject of vehicular communications. The primary methods are algorithmic processes and simulation results. First, an overview and classification of vehicular technologies is presented. Then, the book focuses on specific applications of V2V and V2I communications. Special attention is given to recent research and development results regarding R&D projects in the field, in cooperation with car manufacturing companies and universities at a global level. Designed to facilitate understanding of vehicle to vehicle and vehicle to infrastructure technologies, this textbook is appropriate for undergraduate and graduate students of vehicular communications or mobile networks.

  6. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  7. Survey on Security Issues in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Bassem Mokhtar

    2015-12-01

    Full Text Available Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and having efficient data transfer. Thus, VANETs have different network concerns and security challenges to get the availability of ubiquitous connectivity, secure communications, and reputation management systems which affect the trust in cooperation and negotiation between mobile networking entities. In this survey, we discuss the security features, challenges, and attacks of VANETs, and we classify the security attacks of VANETs due to the different network layers.

  8. Routing in Vehicular Networks: Feasibility, Modeling, and Security

    Directory of Open Access Journals (Sweden)

    Ioannis Broustis

    2008-01-01

    Full Text Available Vehicular networks are sets of surface transportation systems that have the ability to communicate with each other. There are several possible network architectures to organize their in-vehicle computing systems. Potential schemes may include vehicle-to-vehicle ad hoc networks, wired backbone with wireless last hops, or hybrid architectures using vehicle-to-vehicle communications to augment roadside communication infrastructures. Some special properties of these networks, such as high mobility, network partitioning, and constrained topology, differentiate them from other types of wireless networks. We provide an in-depth discussion on the important studies related to architectural design and routing for such networks. Moreover, we discuss the major security concerns appearing in vehicular networks.

  9. Vehicular-2-X communication: state-of-the-art and research in mobile vehicular ad hoc networks

    National Research Council Canada - National Science Library

    Popescu-Zeletin, R; Radusch, Ilja; Rigani, Mihai Adrian

    2010-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Why Vehicular Communication? . . . . . . . . . . . . . . . . . 1.3 Architecture Layers . . . . . . . . . . . . . . . . . . . . . . . . References...

  10. Opportunistic spectrum utilization in vehicular communication networks

    CERN Document Server

    Cheng, Nan

    2016-01-01

    This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.

  11. A Secure Communication Framework for ECUs

    OpenAIRE

    Ali Shuja Siddiqui; Yutian Gui; Jim Plusquellic; Fareena Saqib

    2017-01-01

    Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats in automobile, and present a hardware based security framework that provides real time secure communication...

  12. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks

    Science.gov (United States)

    2017-01-01

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633

  13. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    Science.gov (United States)

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  14. Cooperative vehicular communications in the drive-thru internet

    CERN Document Server

    Zhou, Haibo; Yu, Quan; Shen, Xuemin (Sherman)

    2015-01-01

    This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular netw...

  15. Towards a Security Architecture for Vehicular Ad Hoc Networks

    OpenAIRE

    Plößl, Klaus; Nowey, Thomas; Mletzko, Christian

    2006-01-01

    Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security in VANETs. After defining three application categories the paper outlines main security and privacy requirements in VANETs. Next, a security architecture for VANETs (SAV) is proposed that strives to satisfy the requirements. To find mechanisms applicable in the architecture a survey of existing mechanisms is given.

  16. Intelligent transportation systems 802 11-based vehicular communications

    CERN Document Server

    Hasan, Syed Faraz; Chakraborty, Shyam

    2017-01-01

    This book begins by describing a mathematical model that represents disruption in WLAN-based Vehicular Communications. Secondly, it sets out to reduce the handover latency for establishing quick connections between the mobile nodes and the roadside WLAN APs.

  17. Virtual Induction Loops Based on Cooperative Vehicular Communications

    Directory of Open Access Journals (Sweden)

    Maria Calderon

    2013-01-01

    Full Text Available Induction loop detectors have become the most utilized sensors in traffic management systems. The gathered traffic data is used to improve traffic efficiency (i.e., warning users about congested areas or planning new infrastructures. Despite their usefulness, their deployment and maintenance costs are expensive. Vehicular networks are an emerging technology that can support novel strategies for ubiquitous and more cost-effective traffic data gathering. In this article, we propose and evaluate VIL (Virtual Induction Loop, a simple and lightweight traffic monitoring system based on cooperative vehicular communications. The proposed solution has been experimentally evaluated through simulation using real vehicular traces.

  18. A Secure Communication Framework for ECUs

    Directory of Open Access Journals (Sweden)

    Ali Shuja Siddiqui

    2017-08-01

    Full Text Available Electronic Control Units (ECUs generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats in automobile, and present a hardware based security framework that provides real time secure communication using lightweight cryptographic primitives and propose hardware based authentication protocol. Implementation details, performance and security analysis of proposed framework are presented.

  19. Resilient Secure Aggregation for Vehicular Networks

    NARCIS (Netherlands)

    Dietzel, Stefan; Schoch, Elmar; Kargl, Frank; Könings, Bastian; Weber, M.

    Innovative ways to use ad hoc networking between vehicles are an active research topic and numerous proposals have been made for applications that make use of it. Due to the bandwidth-limited wireless communication medium, scalability is one crucial factor for the success of these future protocols.

  20. Palm Personal Identification for Vehicular Security with a Mobile Device

    Directory of Open Access Journals (Sweden)

    Chih-Yu Hsu

    2013-01-01

    Full Text Available Security certification is drawing more and more attention in recent years; the biometric technology is used in a variety of different areas of security certification. In this paper, we propose a palm image recognition method to identify an individual for vehicular application; it uses palm image as a key for detecting the car owner. We used mobile phone cameras to take palm images and performed a new identification approach by using feature regularization of palm contour. After identification is confirmed, the phone uses Bluetooth/WiFi to connect the car to unlock it. In our evaluation, the experiments show that our approach is effective and feasible.

  1. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  2. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

    KAUST Repository

    Eltayeb, Mohammed E.

    2017-03-14

    Millimeter wave (mmWave) vehicular communication systems will provide an abundance of bandwidth for the exchange of raw sensor data and support driver-assisted and safety-related functionalities. Lack of secure communication links, however, may lead to abuses and attacks that jeopardize the efficiency of transportation systems and the physical safety of drivers. In this paper, we propose two physical layer (PHY) security techniques for vehicular mmWave communication systems. The first technique uses multiple antennas with a single radio-frequency (RF) chain to transmit information symbols to a target receiver and noise-like signals in nonreceiver directions. The second technique uses multiple antennas with a few RF chains to transmit information symbols to a target receiver and opportunistically inject artificial noise in controlled directions, thereby reducing interference in vehicular environments. Theoretical and numerical results show that the proposed techniques provide higher secrecy rate when compared to traditional PHY security techniques that require digital or more complex antenna architectures.

  3. Capacity analysis of vehicular communication networks

    CERN Document Server

    Lu, Ning

    2013-01-01

    This SpringerBrief focuses on the network capacity analysis of VANETs, a key topic as fundamental guidance on design and deployment of VANETs is very limited. Moreover, unique characteristics of VANETs impose distinguished challenges on such an investigation. This SpringerBrief first introduces capacity scaling laws for wireless networks and briefly reviews the prior arts in deriving the capacity of VANETs. It then studies the unicast capacity considering the socialized mobility model of VANETs. With vehicles communicating based on a two-hop relaying scheme, the unicast capacity bound is deriv

  4. Intelligent transportation systems dependable vehicular communications for improved road safety

    CERN Document Server

    Ferreira, Joaquim; Fonseca, José

    2016-01-01

    This book presents cutting-edge work on the most challenging research issues concerning intelligent transportation systems (ITS), introducing selected, highly relevant advanced research on scheduling and real-time communication for vehicular networks, as well as fault tolerance, test beds and simulations for ITS. The authors define new architectures that support cooperative sensing in ITS and offer guidance for the development of a reference end-to-end implementation. The presented results allow advanced traffic and travel management strategies to be formulated on the basis of reliable and real-time input data. The effectiveness of these new strategies, together with the proposed systems, is assessed in field trials and via simulations. The chapters in this book detail new research findings, algorithms, protocols, and the development of an implementation platform for ITS that merges and integrates heterogeneous data sources into a common system. In addition, they provide a set of advanced tools for the contro...

  5. Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks

    NARCIS (Netherlands)

    Dietzel, Stefan; Peter, Andreas; Kargl, Frank

    Vehicular ad-hoc networks are a promising research area. Besides improving safety, traffic efficiency enhancements are a major expected benefit. In this paper, we present a novel security mechanism for traffic efficiency applications that lever- ages on velocity-based vehicle clustering and uses

  6. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  7. Exploring Space - towards high-capacity inter-vehicular communications

    NARCIS (Netherlands)

    Heijenk, Geert; Altintas, O.; Dressler, F.; Hartenstein, H.; Tonguz, O.K.

    2013-01-01

    This presentation discusses the question “Are there still research challenges in inter-vehicular communications”. The premise is that these may come from autonomous, or rather coordinated driving. I will start with a few results from an earlier project, Connect & Drive, where a system for

  8. Digital communication communication, multimedia, security

    CERN Document Server

    Meinel, Christoph

    2014-01-01

    The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities in

  9. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    of the challenges in VANET are less computing capability, smaller onboard storage, safety, reliability, etc. Among the number of solutions proposed recently, Vehicular Cloud Computing (VCC) is one of them. VCC is a technology that provides on-demand services namely Software-as-a-Service (SaaS), Storage......Vehicular Ad-hoc Network (VANET) is a highly mobile autonomous and self-organizing network of vehicles. VANET is a particular case of Mobile Ad-hoc Network (MANET). With the recent advances in the arena of Information and Communication Technology (ICT) and computing, the researchers have envisioned......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  10. A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhipeng Tang

    2016-01-01

    Full Text Available VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC. Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.

  11. Practical secure quantum communications

    Science.gov (United States)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  12. QoS-Aware Chain-based Data Aggregation in Cooperating Vehicular Communication Networks and Wireless Sensor Networks

    NARCIS (Netherlands)

    Taghikhaki, Zahra; Zhang, Y.; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    Vehicular Communication Networks (VCNs) and Wireless Sensor Networks (WSNs) are emerging types of networks, which have individually been extensively explored. However, their cooperation and exploring advantages offered by their integration are unexplored topics. Such integration help better

  13. A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

    OpenAIRE

    Auxeeliya Jesudoss; S. V. KASMIR RAJA; Ashraph Sulaiman

    2014-01-01

    Vehicular communication is one of the fast growing and promising technologies for a safe and comfortable driving environment. These technologies do not end up with economic and safety ramifications, but also extended with other informational and entertainment oriented services. Data are being propagated multi-hop between source and destination vehicles for many real-life applications. Clustering is one of the effective and scalable solutions for data dissemination in wireless ad hoc networks....

  14. A Stochastic Geometry Model for Multi-hop Highway Vehicular Communication

    KAUST Repository

    Farooq, Muhammad Junaid

    2015-11-19

    Carrier sense multiple access (CSMA) protocol is standardized for vehicular communication to ensure a distributed and efficient communication between vehicles. However, several vehicular applications require efficient multi-hop information dissemination. This paper exploits stochastic geometry to develop a tractable and accurate modeling framework to characterize the multi-hop transmissions for vehicular networks in a multi-lane highway setup. In particular, we study the tradeoffs between per-hop packet forward progress, per-hop transmission success probability, and spatial frequency reuse (SFR) efficiency imposed by different packet forwarding schemes, namely, most forward with fixed radius (MFR), the nearest with forward progress (NFP), and the random with forward progress (RFP). We also define a new performance metric, denoted as the aggregate packet progress (APP), which is a dimensionless quantity that captures the aforementioned tradeoffs. To this end, the developed model reveals the interplay between the spectrum sensing threshold (th) of the CSMA protocol and the packet forwarding scheme. Our results show that, in contrary to ALOHA networks which always favor NFP, MFR may achieve the highest APP in CSMA networks if th is properly chosen.

  15. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  16. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  17. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    National Research Council Canada - National Science Library

    Won Min Kang; Jae Dong Lee; Young-Sik Jeong; Jong Hyuk Park

    2015-01-01

    .... ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC) environment through efficient traffic management, traffic accident prevention, and convenience services...

  18. Car-to-Pedestrian Communication Safety System Based on the Vehicular Ad-Hoc Network Environment: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Peng Jing

    2017-10-01

    Full Text Available With the unparalleled growth of motor vehicles, traffic accident between pedestrians and vehicles is one of the most serious issues in the word-wild. Plenty of injuries and fatalities are caused by the traffic accidents and crashes. The connected vehicular ad hoc network as an emerging approach which has the potential to reduce and even avoid accidents have been focused on by many researchers. A large number of car-to-pedestrian communication safety systems based on the vehicular ad hoc network are researching and developing. However, to our limited knowledge, a systematic review about the car-to-pedestrian communication safety system based on the vehicular ad-hoc network has not be written. The purpose and goal of this review is to systematically evaluate and access the reliability of car-to-pedestrian communication safety system based on the vehicular ad-hoc network environment and provide some recommendations for the future works according to throwing some light on the previous literatures. A quality evaluation was developed through established items and instruments tailored to this review. Future works are needed to focus on developing a valid as well as effective communication safety system based on the vehicular ad hoc network to protect the vulnerable road users.

  19. Reliable communication stack for flexible probe vehicle data collection in vehicular ad hoc networks

    DEFF Research Database (Denmark)

    Paulin, Thomas

    . Using other vehicles as forwarders can reduce the collection delay from minutes to seconds, if the network topology allows it, and scheduling the communication at the optimal distance to the road-side unit reduces communication overhead and distributes the resource consumption over time.......Traffic congestions caused by high vehicular densities are an ever increasing problem for both personal and professional transportation, resulting in significant losses each year. While expanding the road infrastructure often offers a short term solution, more intelligent approaches are necessary...... to equally distribute the traffic demand throughout the available infrastructure. To enable intelligent road infrastructure traffic management, detailed knowledge about both current and the historical states are necessary. Equipping vehicles with processing and communication devices enables them to sense...

  20. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  1. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  2. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  3. Provisioning vehicular services and communications based on a bluetooth sensor network deployment.

    Science.gov (United States)

    de Cerio, David Perez-Diaz; Valenzuela, José Luis

    2015-05-29

    It is very common to rule out Bluetooth as a suitable technology for vehicular communications. The reasons behind this decision usually result from misconceptions such as accepting that Bluetooth has a short application range, or assuming its connection setup is not fast enough to allow communication which involves high speed moving nodes. This paper refutes those assertions and proposes the use of Bluetooth not only for Infrastructure-to-Vehicle (I2V) or Road-to-Vehicle (R2V) communications, but also for Vehicle-to-Vehicle (V2V) or Vehicle-to-Infrastructure (V2I) communications. This novel proposal is based on using the remote name request procedure of the standard, combined with an adjustment and optimization of the parameters present in the inquiry and page procedures. The proposed modifications reduce the information exchange delay, thus making Bluetooth a suitable technology for high-speed vehicle communications. The feasibility of the proposed scheme has been validated through experimental tests conducted in different scenarios: laboratory, a real highway and a racing test circuit. There, the communication system was installed in a vehicle circulating at speeds of up to 250 km/h, whereas autonomous devices were disseminated throughout the road path to communicate with the on board devices obtaining satisfying results.

  4. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  5. A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels.

    Science.gov (United States)

    Qureshi, Muhammad Ahsan; Noor, Rafidah Md; Shamim, Azra; Shamshirband, Shahaboddin; Raymond Choo, Kim-Kwang

    2016-01-01

    Radio propagation models (RPMs) are generally employed in Vehicular Ad Hoc Networks (VANETs) to predict path loss in multiple operating environments (e.g. modern road infrastructure such as flyovers, underpasses and road tunnels). For example, different RPMs have been developed to predict propagation behaviour in road tunnels. However, most existing RPMs for road tunnels are computationally complex and are based on field measurements in frequency band not suitable for VANET deployment. Furthermore, in tunnel applications, consequences of moving radio obstacles, such as large buses and delivery trucks, are generally not considered in existing RPMs. This paper proposes a computationally inexpensive RPM with minimal set of parameters to predict path loss in an acceptable range for road tunnels. The proposed RPM utilizes geometric properties of the tunnel, such as height and width along with the distance between sender and receiver, to predict the path loss. The proposed RPM also considers the additional attenuation caused by the moving radio obstacles in road tunnels, while requiring a negligible overhead in terms of computational complexity. To demonstrate the utility of our proposed RPM, we conduct a comparative summary and evaluate its performance. Specifically, an extensive data gathering campaign is carried out in order to evaluate the proposed RPM. The field measurements use the 5 GHz frequency band, which is suitable for vehicular communication. The results demonstrate that a close match exists between the predicted values and measured values of path loss. In particular, an average accuracy of 94% is found with R2 = 0.86.

  6. Securing Near Field Communication

    OpenAIRE

    Kortvedt, Henning Siitonen

    2009-01-01

    Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling data transfer by keeping two devices close together, about 10 cm maximum. NFC is designed for integration with mobile phones, which can communicate with other NFC phones (peer-to-peer) or read information on tags and cards (reader). An NFC device can also be put in card emulation mode, to offer compatibility with other contactless smart card standards. This enables NFC devices to replace traditi...

  7. Securing underwater wireless communication networks

    OpenAIRE

    Domingo Aladrén, Mari Carmen

    2011-01-01

    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  8. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables......’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool...

  9. Performance and Reliability of DSRC Vehicular Safety Communication: A Formal Analysis

    Directory of Open Access Journals (Sweden)

    Chen Xianbo

    2009-01-01

    Full Text Available IEEE- and ASTM-adopted dedicated short range communications (DSRC standard toward 802.11p is a key enabling technology for the next generation of vehicular safety communication. Broadcasting of safety messages is one of the fundamental services in DSRC. There have been numerous publications addressing design and analysis of such broadcast ad hoc system based on the simulations. For the first time, an analytical model is proposed in this paper to evaluate performance and reliability of IEEE 802.11a-based vehicle-to-vehicle (V2V safety-related broadcast services in DSRC system on highway. The proposed model takes two safety services with different priorities, nonsaturated message arrival, hidden terminal problem, fading transmission channel, transmission range, IEEE 802.11 backoff counter process, and highly mobile vehicles on highway into account. Based on the solutions to the proposed analytic model, closed-form expressions of channel throughput, transmission delay, and packet reception rates are derived. From the obtained numerical results under various offered traffic and network parameters, new insights and enhancement suggestions are given.

  10. Performance and Reliability of DSRC Vehicular Safety Communication: A Formal Analysis

    Directory of Open Access Journals (Sweden)

    2009-02-01

    Full Text Available IEEE- and ASTM-adopted dedicated short range communications (DSRC standard toward 802.11p is a key enabling technology for the next generation of vehicular safety communication. Broadcasting of safety messages is one of the fundamental services in DSRC. There have been numerous publications addressing design and analysis of such broadcast ad hoc system based on the simulations. For the first time, an analytical model is proposed in this paper to evaluate performance and reliability of IEEE 802.11a-based vehicle-to-vehicle (V2V safety-related broadcast services in DSRC system on highway. The proposed model takes two safety services with different priorities, nonsaturated message arrival, hidden terminal problem, fading transmission channel, transmission range, IEEE 802.11 backoff counter process, and highly mobile vehicles on highway into account. Based on the solutions to the proposed analytic model, closed-form expressions of channel throughput, transmission delay, and packet reception rates are derived. From the obtained numerical results under various offered traffic and network parameters, new insights and enhancement suggestions are given.

  11. Data and Communication Security

    Directory of Open Access Journals (Sweden)

    Sadeq ALHAMOUZ

    2007-02-01

    Full Text Available The regional initiative was presented by the United Nations Economic and Social Commission for Western Asia in preparation for the world summit, Dec 2003. The Initiative by itself and away from regional trouble and differences between both the Arab countries and other countries in the regions is a good and noble Initiative. However with such differences and lack of trust the security issue should be the first issue tackled and resolved. In this paper it is aimed to look at present tools and techniques available, and then suggest alternatives when possible.

  12. Development of the Real Time Situation Identification Model for Adaptive Service Support in Vehicular Communication Networks Domain

    Directory of Open Access Journals (Sweden)

    Mindaugas Kurmis

    2013-01-01

    Full Text Available The article discusses analyses and assesses the key proposals how to deal with the situation identification for the heterogeneous service support in vehicular cooperation environment. This is one of the most important topics of the pervasive computing. Without the solution it is impossible to adequately respond to the user's needs and to provide needed services in the right place at the right moment and in the right way. In this work we present our developed real time situation identification model for adaptive service support in vehicular communication networks domain. Our solution is different from the others as it uses additional virtual context information source - information from other vehicles which for our knowledge is not addressed in the past. The simulation results show the promising context exchange rate between vehicles. The other vehicles provided additional context source in our developed model helps to increase situations identification level.

  13. Secure communications using quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G. [and others

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  14. Intelligent Shops and Communications Security

    Directory of Open Access Journals (Sweden)

    Carmen Eleonora Stan

    2007-01-01

    Full Text Available One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks.

  15. Exploring Space – towards high-capacity inter-vehicular communications

    NARCIS (Netherlands)

    Heijenk, Geert; Altintas, O.; Dressler, F.; Hartenstein, H.; Tonguz, O.K.

    This presentation discusses the question ’Are there still research challenges in inter-vehicular communications’. The premise is that these may come from autonomous, or rather coordinated driving. I will start with a few results from an earlier project, Connect & Drive, where a system for

  16. Increasing security in inter-chip communication

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Nathan J.; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2017-08-01

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  17. Increasing security in inter-chip communication

    Science.gov (United States)

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  18. Classical noise, quantum noise and secure communication

    Science.gov (United States)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  19. Framework for Flexible Security in Group Communications

    Science.gov (United States)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  20. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  1. DSRC versus 4G-LTE for Connected Vehicle Applications: A Study on Field Experiments of Vehicular Communication Performance

    Directory of Open Access Journals (Sweden)

    Zhigang Xu

    2017-01-01

    Full Text Available Dedicated short-range communication (DSRC and 4G-LTE are two widely used candidate schemes for Connected Vehicle (CV applications. It is thus of great necessity to compare these two most viable communication standards and clarify which one can meet the requirements of most V2X scenarios with respect to road safety, traffic efficiency, and infotainment. To the best of our knowledge, almost all the existing studies on comparing the feasibility of DRSC or LTE in V2X applications use software-based simulations, which may not represent realistic constraints. In this paper, a Connected Vehicle test-bed is established, which integrates the DSRC roadside units, 4G-LTE cellular communication stations, and vehicular on-board terminals. Three Connected Vehicle application scenarios are set as Collision Avoidance, Traffic Text Message Broadcast, and Multimedia File Download, respectively. A software tool is developed to record GPS positions/velocities of the test vehicles and record certain wireless communication performance indicators. The experiments have been carried out under different conditions. According to our results, 4G-LTE is more preferred for the nonsafety applications, such as traffic information transmission, file download, or Internet accessing, which does not necessarily require the high-speed real-time communication, while for the safety applications, such as Collision Avoidance or electronic traffic sign, DSRC outperforms the 4G-LTE.

  2. Secure and privacy-preserving data communication in Internet of Things

    CERN Document Server

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  3. Semiquantum secure direct communication using EPR pairs

    Science.gov (United States)

    Zhang, Ming-Hui; Li, Hui-Fang; Xia, Zhao-Qiang; Feng, Xiao-Yi; Peng, Jin-Ye

    2017-05-01

    Quantum secure direct communication can transmit a secret message directly through quantum channels without first generating a shared secret key. In the most of the existing protocols, quantum secure direct communication is possible only when both communicating participants have quantum capabilities. So what happens if either party of two participants just has classical capabilities? In this paper, we propose a semiquantum secure direct communication protocol with Einstein-Podolsky-Rosen photon pairs in which the classical sender Bob transmits a secret message to quantum Alice directly. After checking the security of quantum channels, Bob encodes his secret message on Alice's code sequence. Then, quantum Alice extracts Bob's secret message by measuring her home qubits and the received code qubits, respectively. In addition, we demonstrate the security of the proposed protocol against some individual eavesdropping attacks. The efficiency analysis shows that our protocol can provide higher efficiency.

  4. QoS-Oriented High Dynamic Resource Allocation in Vehicular Communication Networks

    Directory of Open Access Journals (Sweden)

    Tarek Bejaoui

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are emerging as new research area and attracting an increasing attention from both industry and research communities. In this context, a dynamic resource allocation policy that maximizes the use of available resources and meets the quality of service (QoS requirement of constraining applications is proposed. It is a combination of a fair packet scheduling policy and a new adaptive QoS oriented call admission control (CAC scheme based on the vehicle density variation. This scheme decides whether the connection request is to be admitted into the system, while providing fair access and guaranteeing the desired throughput. The proposed algorithm showed good performance in testing in real world environment.

  5. Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the third edition of the IEEE Vehicular Networking Conference (IEEE VNC 2011) in Amsterdam, the Netherlands. IEEE VNC is a unique conference sponsored by both the IEEE Communications Society and the IEEE Intelligent

  6. Quantum Secure Direct Communication with Quantum Memory.

    Science.gov (United States)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-02

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  7. Quantum Secure Direct Communication with Quantum Memory

    Science.gov (United States)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-01

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  8. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy...... of the card hosting the application. In this paper we address a key issue to realize the S×C idea, namely the outsourcing of the contractpolicy matching service to a Trusted Third Party (TTP). In particular, we present the design and implementation of (SC)2 (Secure Communication over Smart Cards), a system...... securing the communication between a smart card and the TTP which provides the S×C matching service....

  9. Vehicular ad hoc networks standards, solutions, and research

    CERN Document Server

    Molinaro, Antonella; Scopigno, Riccardo

    2015-01-01

    This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and fi...

  10. Security Problems of Communicative Strategies

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available The main directions of safety formation in communication strategies are connected with their adaptation to the conditions of social and psychological variability. Building up a communicative strategy is a versatile process, in which it is necessary to consider a wide spectrum of social and psychological parameters, especially topical in the modern period of social development. Forms of social interactions in schematic formats of contemporary social and economic revolution are reduced, social and functional potentials are depleted, mass society is further differentiating, the pace of historic changes is growing, all this determines the necessity to prepare changes in personality structures to the dynamics of social and fluidity.

  11. Towards autonomous vehicular clouds

    Directory of Open Access Journals (Sweden)

    Stephan Olariu

    2011-09-01

    Full Text Available The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, autonomous vehicular clouds (AVCs. A key feature distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theaters of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities and smart electric power grids will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time and with right-sized resources.

  12. On chaos synchronization and secure communication.

    Science.gov (United States)

    Kinzel, W; Englert, A; Kanter, I

    2010-01-28

    Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems. This journal is © 2010 The Royal Society

  13. Secure Network-Centric Aviation Communication (SNAC)

    Science.gov (United States)

    Nelson, Paul H.; Muha, Mark A.; Sheehe, Charles J.

    2017-01-01

    The existing National Airspace System (NAS) communications capabilities are largely unsecured, are not designed for efficient use of spectrum and collectively are not capable of servicing the future needs of the NAS with the inclusion of new operators in Unmanned Aviation Systems (UAS) or On Demand Mobility (ODM). SNAC will provide a ubiquitous secure, network-based communications architecture that will provide new service capabilities and allow for the migration of current communications to SNAC over time. The necessary change in communication technologies to digital domains will allow for the adoption of security mechanisms, sharing of link technologies, large increase in spectrum utilization, new forms of resilience and redundancy and the possibly of spectrum reuse. SNAC consists of a long term open architectural approach with increasingly capable designs used to steer research and development and enable operating capabilities that run in parallel with current NAS systems.

  14. Access Point Security Service for wireless ad-hoc communication

    OpenAIRE

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the security solution described here comprise topics such as energy efficiency, security standards and ad-hoc networks. The devised solution is called Access Point Security Service (APSS). APSS is able to p...

  15. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  16. Network security with openSSL cryptography for secure communications

    CERN Document Server

    Viega, John; Chandra, Pravir

    2002-01-01

    Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, inst...

  17. Location-Based Services in Vehicular Networks

    Science.gov (United States)

    Wu, Di

    2013-01-01

    Location-based services have been identified as a promising communication paradigm in highly mobile and dynamic vehicular networks. However, existing mobile ad hoc networking cannot be directly applied to vehicular networking due to differences in traffic conditions, mobility models and network topologies. On the other hand, hybrid architectures…

  18. Security Problem of Communication in CORBA System

    Directory of Open Access Journals (Sweden)

    Jedrzej Byrski

    2002-01-01

    Full Text Available CORBA standard defines the mechanisms of shearing services. The key rule plays ORB (Object Request Broker which enables location of suitable server and transparent communication between client and server: This paper presents problems connected with security during communication between ORB systems. In the CORBA system the objects are identified by IOR (Interoperable Object Reference. For T CP/IP it contains IP server address, port and object key. Filtration may use such information as: type of communicate, IP address of client, object key to which client wants to access, type of operation, clients principal. In proposed implementation the firewall works as CORBA server and cooperates with half bridge. It is registered in ORB system and provides the controlling functions for entering packages by IDL interface. In the paper also the structure of filtering module is presented. Its main part is ACL (Access Control Lisa with rules of access. The performance evaluation results are also presented.

  19. Framework For Secure Cloud Data Communication

    Directory of Open Access Journals (Sweden)

    Nitika Aggarwal

    2015-02-01

    Full Text Available Abstract Cloud computing is an emerging technology where all the computing resources are shared on the cloud rather than having local servers or personal devices to handle applications. Encrypting data residing on the cloud database is required to prevent unauthorized access of confidential and critical information and the subsequent modification of the information for personal benefit. As all the organizational information resides on the computers security of this data is of utmost importance. Shamirs secret sharing algorithm is one successful way of encrypting the data. In this research paper we have developed a new encrypting algorithm based on symmetric key cryptography. We have used logical operations like XOR and zero padding. The Shamirs secret sharing algorithm would act on the key generated by our proposed encryption algorithm. This algorithm is an efficient and a simple strategy for secure communication in cloud computing.

  20. Secure Wireless Communications via Cooperative Transmitting

    Directory of Open Access Journals (Sweden)

    Toni Draganov Stojanovski

    2014-01-01

    and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.

  1. Secure electronic commerce communication system based on CA

    Science.gov (United States)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  2. Securing SDN Southbound and Data Plane Communication with IBC

    OpenAIRE

    JunHuy Lam; Sang-Gon Lee; Hoon-Jae Lee; Yustus Eko Oktian

    2016-01-01

    In software-defined network (SDN), the southbound protocol defines the communication between the control plane and the data plane. The agreed protocol, OpenFlow, suggests securing the southbound communication with Transport Layer Security (TLS). However, most current SDN projects do not implement the security segment, with only a few exceptions such as OpenDayLight, HP VAN SDN, and ONOS implementing TLS in the southbound communication. From the telecommunication providers’ perspective, one of...

  3. Securing private communications: Protecting private communications security in EU law: fundamental rights, functional value chains and market incentives

    NARCIS (Netherlands)

    Arnbak, A.M.

    2015-01-01

    As we increasingly depend on private communications security and realize our private communications are systematically insecure, communications security has become a major concern for law- and policymakers around the world. This study researches the central question: how should the EU lawmaker

  4. Secure communication based on spatiotemporal chaos

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao

    2015-08-01

    In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).

  5. Quantitative Safety and Security Analysis from a Communication Perspective

    Directory of Open Access Journals (Sweden)

    Boris Malinowsky

    2015-12-01

    Full Text Available This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective on the communication protocols. The results are obtained using the network simulator ns-3.

  6. Quantitative Safety and Security Analysis from a Communication Perspective

    DEFF Research Database (Denmark)

    Malinowsky, Boris; Schwefel, Hans-Peter; Jung, Oliver

    2014-01-01

    This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real......-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look...... at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective...

  7. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero

  8. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. C. Dutta

    2013-06-01

    Full Text Available This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  9. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  10. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Reliability Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW...

  11. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  12. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau...

  13. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of cancellation of meeting. SUMMARY: The meeting of the Communications Security, Reliability, and...

  14. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION... Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications...

  15. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  16. Enabling content distribution in vehicular ad hoc networks

    CERN Document Server

    Luan, Tom H; Bai, Fan

    2014-01-01

    This SpringerBrief presents key enabling technologies and state-of-the-art research on delivering efficient content distribution services to fast moving vehicles. It describes recent research developments and proposals towards the efficient, resilient and scalable content distribution to vehicles through both infrastructure-based and infrastructure-less vehicular networks. The authors focus on the rich multimedia services provided by vehicular environment content distribution including vehicular communications and media playback, giving passengers many infotainment applications. Common problem

  17. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  18. Protocol Design for Secure Communication in WSN

    Directory of Open Access Journals (Sweden)

    Oguz Ata

    2017-05-01

    Full Text Available Wireless sensor networks are widely used in military applications, monitoring of environmental information, health, domestic, and industrial applications. Despite of these wide usages, the main problem of this kind of topologies is the increasing security needs. This paper has been targeted to develop a novel message identity validation protocol in WSN to provide secure data identity in order to decrease some security threads. Introduced protocol also includes key distribution, node identification, sensitivity mechanisms, to strengthen the introduced method. Moreover, there is also repeated symmetrical key update mechanism without the need to synchronization. Finally, the developed protocol has also been tested in terms of various network parameters.

  19. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Angelica Lo Duca

    2012-11-01

    Full Text Available In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  20. A secure communication suite for underwater acoustic sensor networks.

    Science.gov (United States)

    Dini, Gianluca; Lo Duca, Angelica

    2012-11-07

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  1. Secure and Authenticated Data Communication in Wireless Sensor Networks.

    Science.gov (United States)

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-08-10

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

  2. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    Science.gov (United States)

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  3. Team Automata for Security Analysis of Multicast/Broadcast Communication

    NARCIS (Netherlands)

    ter Beek, Maurice; Lenzini, Gabriele; Petrocchi, Marinella; Busi, N.; Gorrieri, R.; Martinelli, F.

    We show that team automata (TeA) are well suited to model secure multicast/broadcast communication with possible packet loss. This is a consequence of the natural way in which one-to-many (one-to-all) transmissions typical of multicast (broadcast) sessions can be modelled as communications between

  4. Securing SDN Southbound and Data Plane Communication with IBC

    Directory of Open Access Journals (Sweden)

    JunHuy Lam

    2016-01-01

    Full Text Available In software-defined network (SDN, the southbound protocol defines the communication between the control plane and the data plane. The agreed protocol, OpenFlow, suggests securing the southbound communication with Transport Layer Security (TLS. However, most current SDN projects do not implement the security segment, with only a few exceptions such as OpenDayLight, HP VAN SDN, and ONOS implementing TLS in the southbound communication. From the telecommunication providers’ perspective, one of the major SDN consumers besides data centers, the data plane becomes much more complicated with the addition of wireless data plane as it involves numerous wireless technologies. Therefore, the complicated resource management along with the security of such a data plane can hinder the migration to SDN. In this paper, we propose securing the distributed SDN communication with a multidomain capable Identity-Based Cryptography (IBC protocol, particularly for the southbound and wireless data plane communication. We also analyze the TLS-secured Message Queuing Telemetry Transport (MQTT message exchanges to find out the possible bandwidth saved with IBC.

  5. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  6. Quantum Secure Direct Communication Based on Chaos with Authentication

    Science.gov (United States)

    Huang, Dazu; Chen, Zhigang; Guo, Ying; Lee, Moon Ho

    2007-12-01

    A quantum secure direct communication protocol based on chaos is proposed with authentication. It has an advantage over distributing the secret message directly and verifying the communicators’ identities with the assistance of a trusted center. To ensure the security of the secret message and the process of verification, the initial order of the travel particles is disturbed according to a chaotic sequence generated secretly via the general Arnold map. Security analysis demonstrates that the present scheme is secure against several attack strategies, such as the man-in-the-middle attack and Trojan horse attack.

  7. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting February 26, 2010. SUMMARY... Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street...

  8. Library security better communication, safer facilities

    CERN Document Server

    Albrecht, Steve

    2015-01-01

    Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.

  9. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Faust, Sebastian; Hazay, Carmit

    2011-01-01

    We propose a 2-party UC-secure computation protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic......We propose a 2-party UC-secure computation protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly...... on the knowledge of exponent in an RSA group, and build succinct zero-knowledge arguments in the CRS model....

  10. Secure communication in the twin paradox

    CERN Document Server

    Garcia-Escartin, Juan Carlos

    2010-01-01

    The channel capacity between two users is affected by relativistic effects. Under the presence of a fixed noise at the receiver, there appears an asymmetry between "slowly aging" and "fast aging" observers which can be used to have private communication transmission. We discuss some models for users inside gravitational wells and in the twin paradox scenario.

  11. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian

    2012-01-01

    We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic in the size...... on the knowledge of exponent in an RSA group, and build succinct zero-knowledge arguments in the CRS model....

  12. On Perception and Reality in Wireless Air Traffic Communications Security

    OpenAIRE

    Strohmeier, Martin; Schäfer, Matthias; Pinheiro, Rui; Lenders, Vincent; Martinovic, Ivan

    2016-01-01

    More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security commu...

  13. Secure satellite communications in the ISDN

    Science.gov (United States)

    de Cristofaro, R.; Bratcher, B. A.

    The single channel per carrier (SCPC) earth station equipment using continuously variable slope delta modulation voice encoding and phase shift keying carrier modulation is examined. The satellite earth station for SCPC consists of: antenna, high power amplifier, low noise amplifier, RF up-converter and down-converter, and the SCPC common equipment and channel unit. The functions and operations of the common equipment and channel unit of the SCPC are described. The data transmission security is achieved using full duplex digital encryption; the crypto synchronizing sequence format is discussed.

  14. Location-based Forwarding in Vehicular Networks

    NARCIS (Netherlands)

    Klein Wolterink, W.

    2013-01-01

    In this thesis we focus on location-based message forwarding in vehicular networks to support intelligent transportation systems (ITSs). ITSs are transport systems that utilise information and communication technologies to increase their level of automation, in this way levering the performance of

  15. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  16. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.

    Science.gov (United States)

    Kong, Qinglei; Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-08-08

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles.

  17. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  18. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  19. Soliton coding for secured optical communication link

    CERN Document Server

    Amiri, Iraj Sadegh; Idrus, Sevia Mahdaliza

    2015-01-01

    Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0?100 GHz. The soliton signals are multi

  20. Communication, control and security challenges for the smart grid

    CERN Document Server

    Muyeen, SM

    2017-01-01

    The Smart Grid is a modern electricity grid allowing for distributed, renewable intermittent generation, partly owned by consumers. This requires advanced control and communication technologies in order to provide high quality power supply and secure generation, transmission and distribution. This book outlines these emerging technologies.

  1. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  2. Transitioning from analog to digital communications: An information security perspective

    Science.gov (United States)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  3. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for...

  4. Broadcast, Denial-of-Service, and Secure Communication

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    A main challenge in the design of wireless-based Cyber-Physical Systems consists in balancing the need for security and the effect of broadcast communication with the limited capabilities and reliability of sensor nodes. We present a calculus of broadcasting processes that enables to reason about...

  5. Secure and Authenticated Data Communication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Omar Alfandi

    2015-08-01

    Full Text Available Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

  6. Secure and Authenticated Data Communication in Wireless Sensor Networks

    Science.gov (United States)

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  7. Secure SCADA communication by using a modified key management scheme.

    Science.gov (United States)

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  8. SPCC- Software Elements for Security Partition Communication Controller

    Science.gov (United States)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  9. Vehicular networking: from fundamental properties to network solutions

    OpenAIRE

    Fiore, Marco

    2014-01-01

    Vehicular communications are regarded as a key technology within upcoming Intelligent Transportation Systems (ITS), which are expected to improve road safety and traffic management, as well as to enhance the comfort of on-board drivers and passengers. In this manuscript, we will first discuss the need for realistic representations of road traffic dynamics in studies concerning vehicular communications, and show their impact on dedicated (infrastructure-based and spontaneous) network solutions...

  10. A chaos secure communication scheme based on multiplication modulation

    Science.gov (United States)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  11. Three-party quantum secure direct communication against collective noise

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  12. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, this notice...

  13. 75 FR 76465 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-12-08

    ... COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council Meeting AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In accordance with the Federal Advisory Committee Act, this...

  14. Statistics-based email communication security behavior recognition

    Science.gov (United States)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  15. Secure communications with low-orbit spacecraft using quantum cryptography

    Science.gov (United States)

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  16. Constellation-masked secure communication technique for OFDM-PON.

    Science.gov (United States)

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Yu, Jianjun

    2012-10-22

    This paper proposes a novel secure communication technique using constellation masking for applications in orthogonal frequency division multiplexing passive optical network (OFDM-PON). The constellation masking is applied both on each subcarrier and among different subcarriers. The Arnold mapping is utilized as the parameter function for the mask factors. A interleave length is employed to provide a scalable masking granularity for different ONUs. A 15.54 Gb/s constellation-masked 32QAM-OFDM signal has been successfully transmitted over 25-km single mode fiber in the experiment. Experimental results show that the proposed scheme can effectively protect the system from illegal ONU without wasting the bandwidth. The constellation-masked technique suggests an effective solution for the physical secure communication in future OFDM access network.

  17. Security in Visible Light Communication: Novel Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Christian ROHNER

    2015-09-01

    Full Text Available As LED lighting becomes increasingly ubiquitous, Visible Light Communication is attracting the interest of academia and industry as a complement to RF as the physical layer for the Internet of Things. Aside from its much greater spectral availability compared to RF, visible light has several attractive properties that may promote its uptake: its lack of health risks, its opportunities for spatial reuse, its relative immunity to multipath fading, its lack of electromagnetic interference, and its inherently secure nature: differently from RF, light does not penetrate through walls. In this paper, we outline the security implications of Visible Light Communication, review the existing contributions to this under-explored space, and survey the research opportunities that we envision for the near future.

  18. Improving the security of secure direct communication based on the secret transmitting order of particles

    Science.gov (United States)

    Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2006-11-01

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  19. Securing Communication in Ambient Networks for Speech Therapy Systems

    Directory of Open Access Journals (Sweden)

    ZAHARIA, M. H.

    2007-11-01

    Full Text Available One of the most present issues of computer wireless networks is the security. Comparing with their wired counterpart, the wireless networks not only accentuate some of the well-known security vulnerabilities but they are subject of new and specific ones. Among the existing wireless networks the ad hoc ones are the most exposed to attacks and collusions due to the absence of any centralized control. The most efficient way to ensure the communication secrecy, inclusively for ad hoc wireless networks, is the cryptography. From many reasons, following from specific operating conditions, the employment of asymmetric key techniques and Public Key Infrastructure is not a realistic choice. In the networks with a large number of nodes, as wireless sensor networks, a large number of secret keys are involved in order to ensure the communication secrecy. While dynamicity is one of the essential features of mobile wireless networks, when nodes may leave or join the network and in the absence of a centralized control entity, the management of secret keys is crucial. The paper presents the main aspects of mobile wireless networks security and focuses on the key management issue in ad-hoc wireless networks.In this paper the problem of securing mobile devices used in ambient networks for speech therapy is presented. The main target consists in making various mobile devices involved in speech therapy to maintain both the confidentiality of personal data of the patient and also to avoid interference when simultaneous communicate with the control center. Due to non-technical type of user all password management will be made automatic by the control system. As result the mobile device will have a user transparent security layer added. The problem of people from isolated community treatment is also solved by this approach.

  20. Secure communication with a heralded single-photon source

    Energy Technology Data Exchange (ETDEWEB)

    Trifonov, A; Zavriyev, A [MagiQ Technologies, Inc., 11 Ward Street 300, Somerville, MA 02143 (United States)

    2005-12-01

    Secure long distance communication over optical fibres requires robust data encryption. While the encryption itself can be conducted using classical algorithms, there is no unconditionally secure method of classical key distribution. Quantum key distribution (QKD), on the other hand, can provide users of the optical networks with unconditionally secure keys. Since QKD is based on single-photon transmission, one of the challenging tasks is to overcome the distance limitation imposed by the losses in optical fibres. In this work we show that single-photon based QKD outperforms the industry-standard weak coherent pulse approach. We also present our recent experimental results on building a heralded single-photon source based on spontaneous parametric down-conversion of CW light and discuss problems and challenges of heralded single-photon generation in the CW regime.

  1. Secure thermal infrared communications using engineered blackbody radiation.

    Science.gov (United States)

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-06-10

    The thermal (emitted) infrared frequency bands, from 20-40 THz and 60-100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The 'THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25-50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel 'THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10(-6) are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links.

  2. Inherent secure communications using lattice based waveform design

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, Matthew Owen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  3. A secure and robust information hiding technique for covert communication

    Science.gov (United States)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  4. Authentication and consensus overhead in vehicular ad hoc networks

    NARCIS (Netherlands)

    Petit, Jonathan; Mammeri, Zoubir

    Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm

  5. Coherent and automatic address resolution for vehicular ad hoc networks

    OpenAIRE

    Urquiza Aguiar, Luis; Tripp Barba, Carolina; Rebollo Monedero, David; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Forné Muñoz, Jorge

    2015-01-01

    The interest in vehicular communications has increased notably. In this paper, the use of the address resolution (AR) procedures is studied for vehicular ad hoc networks (VANETs).We analyse the poor performance of AR transactions in such networks and we present a new proposal called coherent, automatic address resolution (CAAR). Our approach inhibits the use of AR transactions and instead increases the usefulness of routing signalling to automatically match the IP and MAC addresses. Through e...

  6. Vehicular Engine Design

    Science.gov (United States)

    Hoag, Kevin L.

    This book provides an introduction to the design and mechanical development of reciprocating piston engines for vehicular applications. Beginning from the determination of required displacement, coverage moves into engine configuration and architecture. Critical layout dimensions and design trade-offs are then presented. Coverage continues with material and casting process selection for the cylinder block and heads. Each major engine component and sub-system is then taken up in turn.

  7. Quantum secure direct communication by EPR pairs and entanglement swapping

    CERN Document Server

    Gao, T; Yan, F L; 10.1393/ncb/i2004-10090-1

    2004-01-01

    We present, a quantum secure direct communication scheme achieved by swapping quantum entanglement. In this scheme a set of ordered Einstein-Podolsky-Rosen (HPIl) pairs is used as a quantum information channel for sending secret messages directly. After insuring the safety of the quantum channel, the sender Alice encodes the secret messages directly by applying a series local operations on her particle sequences according to their stipulation. Using three EPR pairs, three bits of secret classical information can be faithfully transmitted from Alice to remote Bob without revealing any information to a potential eavesdropper. By both Alice and Bob's GHZ state measurement results, Bob is able to read out the encoded secret messages directly. The protocol is completely secure if perfect quantum channel is used, because there is not a transmission of the qubits carrying the secret message between Alice and Bob in the public channel.

  8. Connectivity of Highway Vehicular Networks

    OpenAIRE

    Gramaglia, Marco; Trullols-Cruces, Oscar; Naboulsi, Diala; Fiore, Marco; Calderon, Maria

    2014-01-01

    National audience; There is a growing need for vehicular mobility datasets that can be employed in the simulative evaluation of protocols and architectures designed for upcoming vehicular networks. Such datasets should be realistic, publicly available, and heterogeneous, i.e., they should capture varied traffic con- ditions. In this paper, we contribute to the ongoing effort to define such mobility scenarios by introducing a novel set of traces for vehicular network simulation. Our traces are...

  9. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Science.gov (United States)

    2012-07-11

    ... National Security and Emergency Preparedness Communications Functions By the authority vested in me as... communications must be possible under all circumstances to ensure national security, effectively manage... sectors, and the public must inform the development of national security and emergency preparedness (NS/EP...

  10. Two-Hop Secure Communication Using an Untrusted Relay

    Directory of Open Access Journals (Sweden)

    Xiang He

    2009-01-01

    Full Text Available We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.

  11. Deterministic Secure Quantum Communication with Collective Detection Using Single Photons

    Science.gov (United States)

    Huang, Wei; Wen, Qiao-Yan; Liu, Bin; Gao, Fei; Chen, Hui

    2012-09-01

    Two novel single-photon deterministic secure quantum communication (DSQC) schemes with collective detection are proposed. One is a two-party DSQC, the other is a DSQC network. In these two schemes, only single-photon source and single-photon measurements are required, which makes the schemes more feasible with present techniques. Apart from this, a detection strategy called collective detection is utilized in our schemes, in which the detection is taken only once after the whole process of particle transmission. Such detection strategy improves the efficiencies of our protocols and also reduces the cost of realization as the message sender only need to perform unitary operations in the whole communication. What's more, the efficiencies of qubits and source capacity are both high since almost all the states can be used to transmit message except the ones used for eavesdropping check and each single photon can carry one bit of information. Finally, we prove the security of the our protocols by using the theorems on quantum operation discrimination.

  12. A review of secure emergency communications:technical and organisational aspects

    OpenAIRE

    Hartikainen, Heidi; Harnesk, Dan

    2009-01-01

    In organizations responsible for emergency management there is a growing need to develop deep understanding for how communications between emergency actors can be secured and improved. In this paper we examine the current body of knowledge in the field of secure emergency communications in order understand the role of information security in the emergency context? Our study shows that while technical developments aim at effective and secure technologies, organizational aspects of emergency co...

  13. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Kuhn, D

    2002-01-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication...

  14. High Fidelity Down-Conversion Source for Secure Communications using On-Demand Single Photons Project

    Data.gov (United States)

    National Aeronautics and Space Administration — To provide reliably secure communications, development of quantum optical devices for encrypted ground-to-space communications is a necessity. The overall goal of...

  15. Physical and data-link security techniques for future communication systems

    CERN Document Server

    Tomasin, Stefano

    2016-01-01

     This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, I...

  16. Two-way quantum communication: 'secure quantum information exchange'

    Science.gov (United States)

    Mishra, Manoj K.; Maurya, Ajay K.; Prakash, Hari

    2011-06-01

    In this paper, we present a new idea of two-way quantum communication called 'secure quantum information exchange' (SQIE). If there are two arbitrary unknown quantum states |ξrangIA and |ηrangIB, initially with Alice and Bob, respectively, then SQIE protocol leads to the simultaneous exchange of these states between Alice and Bob with the aid of the special kind of six-qubit entangled (SSE) state and classical assistance of the third party, Charlie. The term 'secure' signifies the fact that SQIE protocol either faithfully exchanges the unknown quantum states proceeding in a prescribed way or, in case of any irregularity, the process generates no results. For experimental realization of the SQIE protocol, we have suggested an efficient scheme for generating SSE states using the interaction between highly detuned Λ-type three-level atoms and the optical coherent field. By theoretical calculations, we found that SSE states of almost unit fidelity with perfect success rates for appreciable mean photon numbers (Fav >= 0.999 for |α|2 >= 1.5) can be generated by our scheme. Further, we have discussed possible experimental imperfections, such as atomic-radiative time, cavity damping time, atom-cavity interaction time, and the efficiency of discrimination between the coherent field and the vacuum state shows that our SQIE protocol is within the reach of technology presently available.

  17. Vehicular engine design

    CERN Document Server

    Hoag, Kevin

    2016-01-01

    This book provides an introduction to the design and mechanical development of reciprocating piston engines for vehicular applications. Beginning from the determination of required displacement and performance, coverage moves into engine configuration and architecture. Critical layout dimensions and design trade-offs are then presented for pistons, crankshafts, engine blocks, camshafts, valves, and manifolds.  Coverage continues with material strength and casting process selection for the cylinder block and cylinder heads. Each major engine component and sub-system is then taken up in turn, from lubrication system, to cooling system, to intake and exhaust systems, to NVH. For this second edition latest findings and design practices are included, with the addition of over sixty new pictures and many new equations.

  18. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  19. An integrated solution for secure group communication in wide-area networks

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chevassut, Olivier [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tsudik, Gene [Univ. of California, Irvine, CA (United States)

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  20. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    Science.gov (United States)

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  1. Secure Multi-Gigabit Ultra-Wide Band Communications for Personal Area Networks

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Puerta Ramírez, Rafael; Tafur Monroy, Idelfonso

    2016-01-01

    Secure communications at the physical layer will become a requirement by end users soon. Current security enabling techniques involve cryptography and other higher layer methods to secure the transmitted data. This does not resolve in full the psychological need for trust, especially in access...

  2. Quantum secure direct communication of digital and analog signals using continuum coherent states

    Science.gov (United States)

    Guerra, Antônio Geovan de Araújo Holanda; Rios, Francisco Franklin Sousa; Ramos, Rubens Viana

    2016-11-01

    In this work, we present optical schemes for secure direct quantum communication of digital and analog signals using continuum coherent states and frequency-dependent phase modulation. The main advantages of the proposed schemes are that they do not use entangled states and they can be implemented with today technology. The theory of quantum interference of continuum coherent state is described, and the optical setups for secure direct communication are presented and their securities are discussed.

  3. Vehicular road influence areas

    Science.gov (United States)

    Huertas, María E.; Huertas, José I.; Valencia, Alexander

    2017-02-01

    Vehicle operation over paved and unpaved roads is an emission source that significantly contributes to air pollution. Emissions are derived from vehicle exhaust pipes and re-suspension of particulate matter generated by wind erosion and tire to road surface interactions. Environmental authorities require a methodology to evaluate road impact areas, which enable managers to initiate counter-measures, particularly under circumstances where historic meteorological and/or air quality data is unavailable. The present study describes an analytical and experimental work developed to establish a simplified methodology to estimate the area influenced by vehicular roads. AERMOD was chosen to model pollutant dispersion generated by two roads of common attributes (straight road over flat terrain) under the effects of several arbitrary chosen weather conditions. The resulting pollutant concentration vs. Distance curves collapsed into a single curve when concentration and distance were expressed as dimensionless numbers and this curve can be described by a beta distribution function. This result implied that average concentration at a given distance was proportional to emission intensity and that it showed minor sensitivity to meteorological conditions. Therefore, road influence was defined by the area adjacent to the road limited by distance at which the beta distribution function equaled the limiting value specified by the national air quality standard for the pollutant under consideration.

  4. A fuzzy logic based clustering strategy for improving vehicular ad ...

    Indian Academy of Sciences (India)

    Abstract. This paper aims to improve the clustering of vehicles by using fuzzy logic in Vehicular Ad-Hoc Networks (VANETs) for making the network more robust and scalable. High mobility and scalability are two vital topics to be considered while providing efficient and reliable communication in VANETs. Clustering is of ...

  5. Resilient In-Network Aggregation for Vehicular Networks

    NARCIS (Netherlands)

    Dietzel, Stefan

    2015-01-01

    Applications for vehicular ad hoc networks (VANETs) are an active field of re- search with the potential to significantly contribute to driver safety, traffic efficiency, and comfort. Messages are typically exchanged and forwarded between vehicles using wireless communication, thereby creating a

  6. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  7. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  8. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  9. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  10. Via generalized function projective synchronization in nonlinear Schrödinger equation for secure communication

    Science.gov (United States)

    Zhao, L. W.; Du, J. G.; Yin, J. L.

    2017-12-01

    This paper proposes a novel secured communication scheme in a chaotic system by applying generalized function projective synchronization of the nonlinear Schrödinger equation. This phenomenal approach guarantees a secured and convenient communication. Our study applied the Melnikov theorem with an active control strategy to suppress chaos in the system. The transmitted information signal is modulated into the parameter of the nonlinear Schrödinger equation in the transmitter and it is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory and the adaptive control technique, the controllers are designed to make two identical nonlinear Schrödinger equation with the unknown parameter asymptotically synchronized. The numerical simulation results of our study confirmed the validity, effectiveness and the feasibility of the proposed novel synchronization method and error estimate for a secure communication. The Chaos masking signals of the information communication scheme, further guaranteed a safer and secured information communicated via this approach.

  11. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  12. Secure multi-party communication with quantum key distribution managed by trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  13. Cognitive radio application for vehicular ad hoc networks (VANETS

    Directory of Open Access Journals (Sweden)

    Miladić Suzana D.

    2016-01-01

    Full Text Available This paper presents the application of cognitive radio technology in vehicular ad-hoc networks aimed to improve the communications between vehicles themselves as well as between vehicles and roadside infrastructure. Due to dynamic approach of spectrum access, cognitive radio is a technology that enables more efficient usage of radio-frequency spectrum. We review actual approaches and discuss research challenges related to the use of cognitive radio technology in vehicular ad hoc networks with emphasis on architecture, spectrum management as well as QoS optimization. The researching on cognitive radio application in vehicular networks is still developing and there are not many experimental platforms due to their complex setups. Some related research projects and cognitive radio realizations are provided in this paper.

  14. A Survey on Infrastructure-Based Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Cristiano M. Silva

    2017-01-01

    Full Text Available The infrastructure of vehicular networks plays a major role in realizing the full potential of vehicular communications. More and more vehicles are connected to the Internet and to each other, driving new technological transformations in a multidisciplinary way. Researchers in automotive/telecom industries and academia are joining their effort to provide their visions and solutions to increasingly complex transportation systems, also envisioning a myriad of applications to improve the driving experience and the mobility. These trends pose significant challenges to the communication systems: low latency, higher throughput, and increased reliability have to be granted by the wireless access technologies and by a suitable (possibly dedicated infrastructure. This paper presents an in-depth survey of more than ten years of research on infrastructures, wireless access technologies and techniques, and deployment that make vehicular connectivity available. In addition, we identify the limitations of present technologies and infrastructures and the challenges associated with such infrastructure-based vehicular communications, also highlighting potential solutions.

  15. Evaluation of LED vehicular and pedestrian modules.

    Science.gov (United States)

    2009-04-01

    This study was conducted to verify the compliance of vehicular and pedestrian LED traffic signal modules with the Institute : of Transportation Engineers specifications; and to assess drivers preferences of the LED modules. Four vehicular modules ...

  16. A method for secure communications over a public fiber-optical network.

    Science.gov (United States)

    Wu, Bernard B; Narimanov, Evgenii E

    2006-05-01

    We develop a spread-spectrum based approach to secure communications over existing fiber-optical networks. Secure transmission for a dedicated user is achieved by overlaying a covert channel onto a host channel in the existing active fiber link. The covert channel is optically encoded and temporally spread, and has average power below the noise floor in the fiber, making it hidden for a direct detection thus allowing for cryptographic and steganographic security capabilities. The presence for the host channel in the network provides an ad hoc security expansion and increases the difficulty for an eavesdropper to intercept and decode the secure signal.

  17. Natural computing for vehicular networks

    OpenAIRE

    Toutouh El Alamin, Jamal

    2016-01-01

    La presente tesis aborda el diseño inteligente de soluciones para el despliegue de redes vehiculares ad-hoc (vehicular ad hoc networks, VANETs). Estas son redes de comunicación inalámbrica formada principalmente por vehículos y elementos de infraestructura vial. Las VANETs ofrecen la oportunidad para desarrollar aplicaciones revolucionarias en el ámbito de la seguridad y eficiencia vial. Al ser un dominio tan novedoso, existe una serie de cuestiones abiertas, como el diseño de la infraestruct...

  18. Security of electronic mental health communication and record-keeping in the digital age.

    Science.gov (United States)

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.

  19. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    National Research Council Canada - National Science Library

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-01-01

    .... This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs...

  20. Two-way quantum communication: Generalization of secure ...

    Indian Academy of Sciences (India)

    The idea of secure quantum information exchange (SQIE) [{\\it J. Phys. B: At. Mol. Opt. Phys.} 44, 115504 (2011)] is introduced for the secure exchange of single qubit information states between two legitimate users, Alice and Bob. In the present paper, we extend this original SQIE protocol by presenting a scheme, which ...

  1. 49 CFR 177.810 - Vehicular tunnels.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Vehicular tunnels. 177.810 Section 177.810... Information and Regulations § 177.810 Vehicular tunnels. Except as regards Class 7 (radioactive) materials... through any urban vehicular tunnel used for mass transportation. [Amdt. 177-52, 46 FR 5316, Jan. 19, 1981...

  2. Security Concerns and Countermeasures in Network Coding Based Communications Systems

    DEFF Research Database (Denmark)

    Talooki, Vahid; Bassoli, Riccardo; Roetter, Daniel Enrique Lucani

    2015-01-01

    This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety applications in enhancing current traditional networks. In particular, we analyze two...... key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active....... This paper also presents a detailed taxonomy and a timeline of the different NC security mechanisms and schemes reported in the literature. Current proposed security mechanisms and schemes for NC in the literature are classified later. Finally a timeline of these mechanism and schemes is presented....

  3. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    Science.gov (United States)

    Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  4. Cyber-security for the Controller Area Network (CAN) communication protocol

    OpenAIRE

    Lin, CW; Sangiovanni-Vincentelli, A

    2013-01-01

    We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles with architecture based on Controller Area Network (CAN). We focus on CAN as it will likely continue being used in upcoming in-vehicle architectures. The CAN protocol contains no direct support for secure communications. Retrofitting the protocol with security mechanisms poses several challenges given the very limited data rates available (e.g., 500kbps) since bus utilization may significantly in...

  5. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    Science.gov (United States)

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  6. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  7. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  8. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  9. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  10. Mobile Communications World: Security Implementations Aspects - A State of the Art

    Directory of Open Access Journals (Sweden)

    Nicolas Sklavos

    2003-10-01

    Full Text Available Wireless Communications have become a very attractive and interesting sector for the provision of electronic services. Mobile networks are available almost anytime, anywhere and the user's acceptance of wireless hand-held devices is high. The services, are offered, are strongly increasing due to the different large range of the users' needs. They vary from simple communications services to special and sensitive purposed applications such as electronic commerce and digital cash. It is obvious that in future wireless protocols and communications environments (networks, security will play a key role in the transmitted information operations. This paper summarizes key issues that should be solved for achieving the desirable performance in security implementations and focuses alternative integrations approaches for wireless communications security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. We also propose some efficient methods to implement security schemes in wireless protocols with high performance. The purpose of this paper is to provide the state-of-the-art and research trends on implementations of wireless protocols security for current and future wireless communications.

  11. Chaos and Cryptography: A new dimension in secure communications

    Science.gov (United States)

    Banerjee, Santo; Kurths, J.

    2014-06-01

    This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.

  12. Two-way quantum communication: Generalization of secure ...

    Indian Academy of Sciences (India)

    In all these studies on QT, user Alice sends information state and Bob gets an exact replica of the information state, i.e., this process has one-way quantum communication. If we require two-way quantum communication, then we have to switch two QT proto- cols in opposite directions between Alice and Bob. As completion ...

  13. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  14. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  15. A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter

    Science.gov (United States)

    Kiani-B, Arman; Fallahi, Kia; Pariz, Naser; Leung, Henry

    2009-03-01

    In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this paper, for the first time, a fractional chaotic communication method using an extended fractional Kalman filter is presented. The chaotic synchronization is implemented by the EFKF design in the presence of channel additive noise and processing noise. Encoding chaotic communication achieves a satisfactory, typical secure communication scheme. In the proposed system, security is enhanced based on spreading the signal in frequency and encrypting it in time domain. In this paper, the main advantages of using fractional order systems, increasing nonlinearity and spreading the power spectrum are highlighted. To illustrate the effectiveness of the proposed scheme, a numerical example based on the fractional Lorenz dynamical system is presented and the results are compared to the integer Lorenz system.

  16. Quantum Secure Direct Communication in a noisy environment: Theory and Experiment

    Science.gov (United States)

    Long, Gui Lu

    Quantum communication holds promise for absolutely security in secret message transmission. Quantum secure direct communication (QSDC) is an important branch of the quantum communication in which secret messages are sent directly over a quantum channel with security[Phys. Rev. A 65 , 032302 (2002)]. QSDC offers higher security and is instantaneous in communication, and is a great improvement to the classical communication mode. It is also a powerful basic quantum communication primitive for constructing many other quantum communication tasks such as quantum bidding, quantum signature and quantum dialogue and so on. Since the first QSDC protocol proposed in 2000, it has become one of the extensive research focuses. In this talk, the basic ideas of QSDC will be reviewed, and major QSDC protocols will be described, such as the efficient-QSDC protocol, the two-step QSDC protocol, the one-time-pad QSDC protocol, the high-dimensional QSDC protocol and so on. Experimental progress is also developing steadily, and will also be reviewed. In particular, the quantum one-time-pad QSDC protocol has recently been successfully demonstrated experimentally[arXiv:1503.00451]. Work supported by China National Natural Science Foundation, the Ministry of Science and Technology of China.

  17. Two-Hop Secure Communication Using an Untrusted Relay

    National Research Council Canada - National Science Library

    He, Xiang; Yener, Aylin

    2009-01-01

    .... Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable...

  18. Information technology convergence security, robotics, automations and communication

    CERN Document Server

    Barolli, Leonard; Xhafa, Fatos; Jeong, Hwa-Young

    2013-01-01

    Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

  19. Short Communication: A qualitative assessment of food security in ...

    African Journals Online (AJOL)

    Thematic analysis shows that key elicited concerns regarding food security included lack of capital for agriculture, lack of dietary diversity, seasonal insecurity and anxiety about the future. Access to water was limited to a single borehole located within the camp. Few reliable and safe sources could be identified for cooking ...

  20. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  1. GSM-PKI solution enabling secure mobile communications.

    Science.gov (United States)

    Jelekäinen, Pekka

    2004-03-31

    Because of its wide distribution and ease of use, the mobile phone, as a reliable personal communications channel, offers an excellent basis for the provision of reliable electronic communications services. In Finland, ca. 75% of the citizens have a mobile phone and, at present and most likely also in the future, it is the most widely spread service channel allowing reliable electronic communications. Despite the restricted functions of the mobile phone, the citizens can use the phone also as a communications medium. In 2001, the Finns sent over 1 billion SMS messages. In Finland, TeliaSonera Finland Oyi and the Population Register Centre (PRC) have closed a co-operation agreement with the aim of creating a mobile phone service for the electronic identification of a person. The co-operation launched is a significant development project from the perspective of the citizens. As a result, the consumers will have a new alternative for reliable electronic communications and commerce in data networks in addition to the electronic identification card. In the future, it will be possible to use the services of both public administration and the private sector by means of a mobile phone more reliably than before, without a physical visit, e.g. to a health centre or to another provider of healthcare services. The possibility of identification and signature by a mobile phone allows an easier provision of versatile services irrespective of time and place, because, in addition to voice, text message, and WAP functions, the service can be utilised also in communications services through the Internet, in which case, the mobile phone acts like a card reader. From the perspective of reliable personal mobile communications, the healthcare sector is one of the most significant and challenging application areas.

  2. Practical Quantum Cryptography for Secure Free-Space Communications

    Energy Technology Data Exchange (ETDEWEB)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  3. Wireless multimedia communications convergence, DSP, QoS, and security

    CERN Document Server

    Rao, KR

    2008-01-01

    This title helps to take maximum advantage of wireless technology and exploit potential advances. With the rapid evolution of multimedia communications, engineers and other professionals are generally forced to hoard a plethora of different texts and journals to maintain a solid grasp on essential ideas and techniques in the field. ""Wireless Multimedia Communications"" provides researchers and students with a primary reference to help readers take maximum advantage of current systems and uncover opportunities to propose new and novel protocols, applications, and services.This title helps to e

  4. Security in Nano Communication: Challenges and Open Research Issues

    NARCIS (Netherlands)

    Dressler, Falko; Kargl, Frank

    Nano communication is one of the fastest growing emerging research fields. In recent years, much progress has been achieved in developing nano machines supporting our needs in health care and other scenarios. However, experts agree that only the interaction among nano machines allows to address the

  5. Single-shot secure quantum network coding on butterfly network with free public communication

    Science.gov (United States)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  6. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    Science.gov (United States)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  7. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    Science.gov (United States)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  8. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  9. Two-hop Secure Communication Using an Untrusted Relay

    CERN Document Server

    He, Xiang

    2009-01-01

    We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a ca...

  10. Quantum secure direct communication against the collective noise with polarization-entangled Bell states

    Science.gov (United States)

    Dong, Li; Wang, Jun-Xi; Li, Qing-Yang; Shen, Hong-Zhi; Dong, Hai-Kuan; Xiu, Xiao-Ming; Ren, Yuan-Peng; Gao, Ya-Jun

    2015-12-01

    We propose a quantum secure direct communication protocol via a collective noise channel, exploiting polarization-entangled Bell states and the nondemolition parity analysis based on weak cross-Kerr nonlinearities. The participant Bob, who will receive the secret information, sends one of two photons in a polarization-entangled Bell state exploiting the transmission circuit against the collective noise to the participant Alice, who will send the secret information, by the means of photon block transmission. If the first security check employing the nondemolition parity analysis is passed, the task of securely distributing the quantum channel is fulfilled. Encoding secret information on the photons sent from Bob by performing single-photon unitary transformation operations, Alice resends these photons to Bob through the transmission circuit against the collective noise. Exploiting the nondemolition parity analysis to distinguish Bell states, Bob can obtain the secret information from Alice after the second security check is passed, and the resulting Bell states can be applied to other tasks of quantum information processing. Under the condition of the secure quantum channel being confirmed, the photons that are utilized in the role of the security check can be applied to the function of secure direct communication, thus enhancing the efficiency of transmitting secret information and saving a lot of resources.

  11. Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-hoc Network Environment

    OpenAIRE

    Khairnar, Mrs. Vaishali D.; Pradhan, Dr. S. N.

    2014-01-01

    A Vehicular Ad hoc Network (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort and entertainment. The performance of communication depends on how better routing takes place in the network. Routing data between the source and destination vehicle de...

  12. Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

    OpenAIRE

    Arindam Sarkar; J. K. Mandal

    2012-01-01

    In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of publ...

  13. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  14. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  15. Use of LSP in securing wireless LAN communications

    Science.gov (United States)

    Newman, Richard E.; Bouldin, B.; Broccard, Phillipe; Coscenza, Thomas; Farago, Steve; Hoyt, Mark; Nolan, Keith; Sanders, Mark; Swanson, Tim; Winner, Joe

    2000-11-01

    The Layered Service Provider (LSP) is a mechanism available in Microsoft Windows 95 and Windows 98 to insert a protocol layer between the Winsock library calls and the transport layer of the network protocol stack. This paper discusses the use of encryption at the LSP to provide for security on wireless LANs that is transparent to the applications. Use of the LSP allows similarly transparent cryptographic isolation over any medium that may be accessed by the network protocol stack. Hardware-based cryptography in the form of Fortezza cards was used for this project, but the approach works just as well with software-based cryptography. The system was developed jointly by teams at the University of Florida in its Integrated Process and Product Design (IPPD) course and a liaison engineer at Raytheon Systems Division.

  16. Secure digital communication using controlled projective synchronisation of chaos

    Energy Technology Data Exchange (ETDEWEB)

    Chee, C.Y. [School of Mechanical and Production Engineering, Nanyang Technological University, Singapore 639798 (Singapore)]. E-mail: chinyi_chee@pmail.ntu.edu.sg; Xu Daolin [School of Mechanical and Production Engineering, Nanyang Technological University, Singapore 639798 (Singapore)

    2005-02-01

    A new approach to chaos communication is proposed to encrypt digital information using controlled projective synchronisation. The scheme encrypts a binary sequence by manipulating the scaling feature of synchronisation from the coupled system. The transmitted signal therefore embeds only a single set of statistical properties. This prevents cryptanalysts from breaking the chaotic encryption scheme by using characteristic cryptanalysis that aims to detect switching of statistical properties in the intercepted information carrier signal. Pseudo-random switching key is incorporated into the scheme to masked out the deterministic nature of the underlying coupled system.

  17. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    Science.gov (United States)

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS

  18. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    Directory of Open Access Journals (Sweden)

    Hequn Hu

    2017-09-01

    Full Text Available The Internet of Things (IoT represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor and a destination (e.g., controller via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS and time splitting (TS policies, called intuitive secure schemes based on PS (Int-PS, precoded secure scheme based on PS (Pre-PS, intuitive secure scheme based on TS (Int-TS and precoded secure scheme based on TS (Pre-TS, respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T , which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Children's Security in the Context of Family Instability and Maternal Communications

    Science.gov (United States)

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  1. Smarter hospital communication: secure smartphone text messaging improves provider satisfaction and perception of efficacy, workflow.

    Science.gov (United States)

    Przybylo, Jennifer A; Wang, Ange; Loftus, Pooja; Evans, Kambria H; Chu, Isabella; Shieh, Lisa

    2014-09-01

    Though current hospital paging systems are neither efficient (callbacks disrupt workflow), nor secure (pagers are not Health Insurance Portability and Accountability Act [HIPAA]-compliant), they are routinely used to communicate patient information. Smartphone-based text messaging is a potentially more convenient and efficient mobile alternative; however, commercial cellular networks are also not secure. To determine if augmenting one-way pagers with Medigram, a secure, HIPAA-compliant group messaging (HCGM) application for smartphones, could improve hospital team communication. Eight-week prospective, cluster-randomized, controlled trial Stanford Hospital Three inpatient medicine teams used the HCGM application in addition to paging, while two inpatient medicine teams used paging only for intra-team communication. Baseline and post-study surveys were collected from 22 control and 41 HCGM team members. When compared with paging, HCGM was rated significantly (P applications improve provider perception of in-hospital communication, while providing the information security that paging and commercial cellular networks do not. © 2014 The Authors Journal of Hospital Medicine published by Wiley Periodicals, Inc. on behalf of Society of Hospital Medicine.

  2. Field test of a practical secure communication network with decoy-state quantum cryptography.

    Science.gov (United States)

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  3. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    Science.gov (United States)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  4. Improving Roadside Unit Deployment in Vehicular Networks by Exploiting Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Manuel Fogue

    2018-01-01

    Full Text Available Vehicular networks make use of the Roadside Units (RSUs to enhance the communication capabilities of the vehicles in order to forward control messages and/or to provide Internet access to vehicles, drivers and passengers. Unfortunately, within vehicular networks, the wireless signal propagation is mostly affected by buildings and other obstacles (e.g., urban fixtures, in particular when considering the IEEE 802.11p standard. Therefore, a crowded RSU deployment may be required to ensure vehicular communications within urban environments. Furthermore, some applications, notably those applications related to safety, require a fast and reliable warning data transmission to the emergency services and traffic authorities. However, communication is not always possible in vehicular environments due to the lack of connectivity even employing multiple hops. To overcome the signal propagation problem and delayed warning notification time issues, an effective, smart, cost-effective and all-purpose RSU deployment policy should be put into place. In this paper, we propose the genetic algorithm for roadside unit deployment (GARSUD system, which uses a genetic algorithm that is capable of automatically providing an RSU deployment suitable for any given road map layout. Our simulation results show that GARSUD is able to reduce the warning notification time (the time required to inform emergency authorities in traffic danger situations and to improve vehicular communication capabilities within different density scenarios and complexity layouts.

  5. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    Science.gov (United States)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  6. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hua Dai

    2016-02-01

    Full Text Available In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols.

  7. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    Science.gov (United States)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  8. An efficient controlled quantum secure direct communication and authentication by using four particle cluster states

    Science.gov (United States)

    Nanvakenari, Milad; Houshmand, Monireh

    In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.

  9. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  10. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors

    Directory of Open Access Journals (Sweden)

    Yishan Su

    2017-04-01

    Full Text Available Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1 to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2 the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3 the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  11. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    Science.gov (United States)

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  12. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    Science.gov (United States)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  13. Electronic Communication of Protected Health Information: Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Drolet, Brian C; Marwaha, Jayson S; Hyatt, Brad; Blazar, Phillip E; Lifchez, Scott D

    2017-06-01

    Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). However, text messaging has created new risks for breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons' knowledge and compliance with privacy and security standards for electronic communication by text message. A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. Of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent breach of privacy with electronic communication. Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent breach when using this form of communication. Copyright © 2017 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  14. Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage

    Directory of Open Access Journals (Sweden)

    Cosmo Lupo

    2015-05-01

    Full Text Available Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed with unlimited computational power and perfect technologies, who is only constrained by the laws of physics. We review recent results showing that, under the assumption that the eavesdropper can store quantum information only for a limited time, it is possible to enhance the performance of quantum key distribution in both a quantitative and qualitative fashion. We consider quantum data locking as a cryptographic primitive and discuss secure communication and key distribution protocols. For the case of a lossy optical channel, this yields the theoretical possibility of generating secret key at a constant rate of 1 bit per mode at arbitrarily long communication distances.

  15. Compound synchronization of four memristor chaotic oscillator systems and secure communication.

    Science.gov (United States)

    Sun, Junwei; Shen, Yi; Yin, Quan; Xu, Chengjie

    2013-03-01

    In this paper, a novel kind of compound synchronization among four chaotic systems is investigated, where the drive systems have been conceptually divided into two categories: scaling drive systems and base drive systems. Firstly, a sufficient condition is obtained to ensure compound synchronization among four memristor chaotic oscillator systems based on the adaptive technique. Secondly, a secure communication scheme via adaptive compound synchronization of four memristor chaotic oscillator systems is presented. The corresponding theoretical proofs and numerical simulations are given to demonstrate the validity and feasibility of the proposed control technique. The unpredictability of scaling drive systems can additionally enhance the security of communication. The transmitted signals can be split into several parts loaded in the drive systems to improve the reliability of communication.

  16. Secure communication and co-operation of distributed Electronic Patient Records.

    Science.gov (United States)

    Blobel, Bernd

    2002-01-01

    Electronic Health Records (EHR) are moving towards the core application of health information systems. Enabling informational interoperability of shared care environment including EHR, structure and function of components used have to follow open standards and publicly available specifications. This comprises also methods and tools applied. Security services needed have to be an integral part of architecture and operation of the specified and implemented components. Starting with basic architectural paradigms the Magdeburg Medical Informatics Department was involved in at the early nineties, the secure behaviour of components has been derived. For establishing the required trustworthiness, security models have been introduced and presented in the paper. Beside communication security services based on standardised Public Key Infrastructure (PKI) and security token such as Health Professional Cards (HPC), policy-defined application security services such as authorisation, access control, accountability, etc., of information recorded, stored and processed must be guaranteed. In that context, appropriate resource access decision services have to be established. As the HARP project result, a component-based EHR architecture has been specified and demonstrated for enforcing fine-grained security services by binding certificates to application components, by the way enforcing policies.

  17. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  18. Study and Analysis of the Internet Protocol Security and Its Impact on Interactive Communications

    Science.gov (United States)

    Khan, Arshi; Ansari, Seema

    Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.

  19. PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET)

    NARCIS (Netherlands)

    Förster, David; Kargl, Frank; Löhr, Hans

    2014-01-01

    Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to

  20. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  1. The Next Frontier in Communication and the ECLIPPSE Study: Bridging the Linguistic Divide in Secure Messaging

    Directory of Open Access Journals (Sweden)

    Dean Schillinger

    2017-01-01

    Full Text Available Health systems are heavily promoting patient portals. However, limited health literacy (HL can restrict online communication via secure messaging (SM because patients’ literacy skills must be sufficient to convey and comprehend content while clinicians must encourage and elicit communication from patients and match patients’ literacy level. This paper describes the Employing Computational Linguistics to Improve Patient-Provider Secure Email (ECLIPPSE study, an interdisciplinary effort bringing together scientists in communication, computational linguistics, and health services to employ computational linguistic methods to (1 create a novel Linguistic Complexity Profile (LCP to characterize communications of patients and clinicians and demonstrate its validity and (2 examine whether providers accommodate communication needs of patients with limited HL by tailoring their SM responses. We will study >5 million SMs generated by >150,000 ethnically diverse type 2 diabetes patients and >9000 clinicians from two settings: an integrated delivery system and a public (safety net system. Finally, we will then create an LCP-based automated aid that delivers real-time feedback to clinicians to reduce the linguistic complexity of their SMs. This research will support health systems’ journeys to become health literate healthcare organizations and reduce HL-related disparities in diabetes care.

  2. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  3. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  4. A secure searcher for end-to-end encrypted email communication

    OpenAIRE

    Mani, Balamaruthu

    2015-01-01

    Email has become a common mode of communication for confidential personal as well as business needs. There are different approaches to authenticate the sender of an email message at the receiver‟s client and ensure that the message can be read only by the intended recipient. A typical approach is to use an email encryption standard to encrypt the message on the sender‟s client and decrypt it on the receiver‟s client for secure communication. A major drawback of this approach is that only the ...

  5. Numerical Simulation Bidirectional Chaotic Synchronization of Spiegel-Moore Circuit and Its Application for Secure Communication

    Science.gov (United States)

    Sanjaya, W. S. M.; Anggraeni, D.; Denya, R.; Ismail, N.

    2017-03-01

    Spiegel-Moore is a dynamical chaotic system which shows irregular variability in the luminosity of stars. In this paper present the performed the design and numerical simulation of the synchronization Spiegel-Moore circuit and applied to security system for communication. The initial study in this paper is to analyze the eigenvalue structures, various attractors, Bifurcation diagram, and Lyapunov exponent analysis. We have studied the dynamic behavior of the system in the case of the bidirectional coupling via a linear resistor. Both experimental and simulation results have shown that chaotic synchronization is possible. Finally, the effectiveness of the bidirectional coupling scheme between two identical Spiegel-Moore circuits in a secure communication system is presented in details. Integration of theoretical electronic circuit, the numerical simulation by using MATLAB®, as well as the implementation of circuit simulations by using Multisim® has been performed in this study.

  6. Adaptive fuzzy observer based synchronization design and secure communications of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Hyun, Chang-Ho [ICS Laboratory (B723), Department of Electrical and Electronic Engineering, Yonsei University, 134, Shinchon-Dong, Seodaemun-Gu, Seoul 120-749 (Korea, Republic of)] e-mail: hhyun6@yonsei.ac.kr; Kim, Jae-Hun [ICS Laboratory (B723), Department of Electrical and Electronic Engineering, Yonsei University, 134, Shinchon-Dong, Seodaemun-Gu, Seoul 120-749 (Korea, Republic of); Kim, Euntai [ICS Laboratory (B723), Department of Electrical and Electronic Engineering, Yonsei University, 134, Shinchon-Dong, Seodaemun-Gu, Seoul 120-749 (Korea, Republic of); Park, Mignon [ICS Laboratory (B723), Department of Electrical and Electronic Engineering, Yonsei University, 134, Shinchon-Dong, Seodaemun-Gu, Seoul 120-749 (Korea, Republic of)

    2006-02-01

    This paper proposes a synchronization design scheme based on an alternative indirect adaptive fuzzy observer and its application to secure communication of chaotic systems. It is assumed that their states are unmeasurable and their parameters are unknown. Chaotic systems and the structure of the fuzzy observer are represented by the Takagi-Sugeno fuzzy model. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed system is guaranteed. Through this process, the asymptotic synchronization of chaotic systems is achieved. The proposed observer is applied to secure communications of chaotic systems and some numerical simulation results show the validity of theoretical derivations and the performance of the proposed observer.

  7. Secure space-to-space interferometric communications and its nexus to the physics of quantum entanglement

    Science.gov (United States)

    Duarte, F. J.

    2016-12-01

    The history of the probability amplitude equation | ψ > = ( | x , y > - | y , x > ) applicable to quanta pairs, propagating in different directions with entangled polarizations, is reviewed and traced back to the 1947-1949 period. The interferometric Dirac foundations common to | ψ > = ( | x , y > - | y , x > ) and the generalized N-slit interferometric equation, for indistinguishable quanta, are also described. The results from a series of experiments on N-slit laser interferometers, with intra interferometric propagation paths up to 527 m, are reviewed. Particular attention is given to explain the generation of interferometric characters, for secure space-to-space communications, which immediately collapse on attempts of interception. The design of a low divergence N-slit laser interferometer for low Earth orbit-low Earth orbit (LEO-LEO), and LEO-geostationary Earth orbit (LEO-GEO), secure interferometric communications is described and a weight assessment is provided.

  8. On-board Unit and its Possibilities of Communications on Safety and Security Principles

    Directory of Open Access Journals (Sweden)

    Martin Vaculik

    2008-01-01

    Full Text Available The technical solution of on-board unit (OBU for vehicles used for dangerous good transport and design of vehicle sensor network (based on CAN bus for dangerous good monitoring will be discussed. In presentation the conception of GSM/GPRS networking subsystem for real time data transmission into monitoring centre will be described. Next themes of discussion will be focused on the possibilities of solution of safety-related communication channel for safety sensor network in accordance with standard for functional safety of Electrical / Electronic / Programmable Electronic (E/E/PE systems IEC 61508, recommended methods of risk analysis and possibilities of their modelling and proposal of secure communication channel over GSM/GPRS for secure data transmission into control centre on the base of IPsec protocol.

  9. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  10. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  11. Super-Activation as a Unique Feature of Secure Communication in Malicious Environments

    Directory of Open Access Journals (Sweden)

    Rafael F. Schaefer

    2016-05-01

    Full Text Available The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs, in which the legitimate users know only that the true channel realization comes from a pre-specified uncertainty set and that it varies from channel use to channel use in an arbitrary and unknown manner. This concept not only captures the case of channel uncertainty, but also models scenarios in which malevolent adversaries influence or jam the transmission of the legitimate users. For secure communication over orthogonal arbitrarily varying wiretap channels (AVWCs it has been shown that the phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. As a consequence, a super-activated AVWC is robust and continuous in the uncertainty set, although a single AVWC might not be. Moreover, it is shown that the question of super-activation and the continuity of the secrecy capacity solely depends on the legitimate link. Accordingly, the single-user AVC is subsequently studied and it is shown that in this case, super-activation for non-secure message transmission is not possible making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization. Such knowledge is important for medium access control and in particular resource allocation as it determines the overall performance of a system.

  12. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    OpenAIRE

    Leandro Marin; Marcin Piotr Pawlowski; Antonio Jara

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimizat...

  13. Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band

    Science.gov (United States)

    2013-10-30

    quantum Zeno blockade in nonlinear optical systems [12]. Considering specifically a lithium- niobate microresonator, we found that a deterministic phase...and KCQ key generation, employs secrecy protection mechanisms at the physical signal level away from the bit level at the application layer end of...communications and is referred to as optical CDMA (OCDMA). OCDMA can provide an inherent physical layer security and is also capable of various networking

  14. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2016-09-21

    The concept of physical layer security builds on the pivotal idea of turning the channel\\'s imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  15. Perfect Storm of Inpatient Communication Needs and an Innovative Solution Utilizing Smartphones and Secured Messaging.

    Science.gov (United States)

    Patel, Neha; Siegler, James E; Stromberg, Nathaniel; Ravitz, Neil; Hanson, C William

    2016-08-10

    In hospitals, effective and efficient communication among care providers is critical to the provision of high-quality patient care. Yet, major problems impede communications including the frequent use of interruptive and one-way communication paradigms. This is especially frustrating for frontline providers given the dynamic nature of hospital care teams in an environment that is in constant flux. We conducted a pre-post evaluation of a commercially available secured messaging mobile application on 4 hospital units at a single institution for over one year. We included care providers on these units: residents, hospitalists, fellows, nurses, social workers, and pharmacists. Utilization metrics and survey responses on clinician perceptions were collected and analyzed using descriptive statistics, the Kruskal-Wallis test, and Mann-Whitney U test where appropriate. Between May 2013 and June 2014, 1,021 providers sent a total of 708,456 messages. About 85.5% of total threads were between two providers and the remaining were group messages. Residents and social workers/clinical resource coordinators were the largest per person users of this communication system, sending 9 (IQR 2-20) and 9 (IQR 2-22) messages per person per day, and receiving 18 (IQR 5-36) and 14 (IQR 5-29) messages per person per day, respectively (p=0.0001). More than half of the messages received by hospitalists, residents, and nurses were read within a minute. Communicating using secured messaging was found to be statistically significantly less disruptive to workflow by both nursing and physician survey respondents (psecured messaging improved perceived efficiency among providers on 4 hospital units. Our study suggests that a mobile application can improve communication and workflow efficiency among providers in a hospital. New technology has the potential to improve communication among care providers in hospitals.

  16. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    Science.gov (United States)

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  17. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    Directory of Open Access Journals (Sweden)

    Angelica Reyes-Muñoz

    2016-01-01

    Full Text Available The emergence of Body Sensor Networks (BSNs constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1 an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving that may cause traffic accidents is presented; (2 A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3 as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  18. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    Science.gov (United States)

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  19. The Evolutionary Random Interval Fingerprint for a More Secure Wireless Communication

    Directory of Open Access Journals (Sweden)

    Kuo-Kun Tseng

    2013-01-01

    Full Text Available In this paper, we propose a novel evolutionary Random Interval Fingerprint (RIF for active RFID and ZigBee systems. This new approach can enable more secure multi-party communication since, if the wireless packets are forged by another wireless communication party, the interval fingerprint can provide another way to detect the spoofing packet. Moreover, the random evolutionary algorithms, both genetic and memetic, are also proposed as a means to generate the random interval fingerprint. Compared to the conventional random generator, our approach is flexible in generating uniform random and long cycle numbers, and more robust for the anti-cracking. It is difficult for the forged party to produce the fake random intervals. Finally, we provide an application example, a completed work survey, pseudo-code and analysis result to prove that our concept is feasible for the Wireless communication.

  20. Speaker identification for the improvement of the security communication between law enforcement units

    Science.gov (United States)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  1. A Fuzzy Logic Approach to Beaconing for Vehicular Ad hoc Networks

    NARCIS (Netherlands)

    Ghafoor, Kayhan Zrar; Bakar, Kamalrulnizam Abu; van Eenennaam, Martijn; Khokhar, Rashid Hafeez; Gonzalez, Alberto J.

    Vehicular Ad Hoc Network (VANET) is an emerging field of technology that allows vehicles to communicate together in the absence of fixed infrastructure. The basic premise of VANET is that in order for a vehicle to detect other vehicles in the vicinity. This cognizance, awareness of other vehicles,

  2. A scalable data dissemination protocol for both highway and urban vehicular environments

    NARCIS (Netherlands)

    de Souza Schwartz, Ramon; Scholten, Johan; Havinga, Paul J.M.

    2013-01-01

    Vehicular ad hoc networks (VANETs) enable the timely broadcast dissemination of event-driven messages to interested vehicles. Especially when dealing with broadcast communication, data dissemination protocols must achieve a high degree of scalability due to frequent deviations in the network

  3. Kajian Aspek Security pada Jaringan Informasi dan Komunikasi Berbasis Visible Light Communication

    Directory of Open Access Journals (Sweden)

    Syifaul Fuada

    2017-02-01

    Full Text Available Cahaya tampak dapat dimanfaatkan sebagai media informasi ataupun komunikasi, teknologi ini dikenal dengan istilah Visible Light Communication yang menawarkan beberapa keunggulan dibandingkan komunikasi nirkabel lainnya seperti RF dan IR. Yakni cakupan bandwidth lebih lebar dan bebas lisensi, aman bagi kesehatan manusia dan tidak terganggu interferensi elektromagnetik. Sistem VLC terdiri atas tiga bagian besar, yakni bagian transmitter dengan menggunakan devais LED, kanal yang berupa ruang bebas (free space dan receiver dengan menggunakan devais photodetector atau image camera. Penerapan VLC berlandaskan pedoman IEEE 802.15.17 yang mana baru dirancang dalam waktu 5 tahun belakangani ini (sejak tahun 2009, meliputi meliputi layer fisik (physical layer dan layer MAC (medium access control.  Sebagaimana teknologi komunikasi pada umumnya, VLC juga menyediakan akses security yang dibahas pada bagian layer MAC. Namun pada praktiknya masih belum begitu masif dilakukan oleh para peneliti. Hal ini sangat wajar karena mengingat VLC merupakan teknologi yang sedang dalam tahap pengembangan yang menjadikan penelitian VLC umumnya berfokus pada ‘bagaimana meningkatkan speed dari keterbatasan komponen-komponen pembangun (IC, photodiode, LED, transistor, dll yang tersedia saat ini’. Tantangan teknologi VLC selain target peningkatan kecepatan bit-rate, mobility communication, mengurangi interference noise, menyediakan layanan multi-acces juga salah satunya adalah isu security. Makalah ini merupakan studi literature (review paper yang didapatkan dari dokumen-dokumen hasil peneltian baik di jurnal dan conference terkait dengan praktik-praktik security VLC yang pernah dilakukan dengan skema indoor maupun outdoor.

  4. Multi-channel thermal infrared communications using engineered blackbody radiation for security applications

    Science.gov (United States)

    Hu, F.; Liang, X.; Lucyszyn, S.

    2014-10-01

    The thermal (emitted) infrared frequency bands, typically from 20-40 THz and 60-100 THz, are best known for applications in thermography, such as target acquisition, surveillance, night vision, and remote sensing. This unregulated part of the spectral range offers opportunities for the development of short-range secure communications. The `THz Torch' concept was recently demonstrated by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels. The energy in each channel is then independently pulse-modulated, transmitted and detected, creating a robust form of short-range secure communications in the far/mid infrared. In this paper, recent progress for the `THz Torch' technology will be presented; the physical level integrity for multichannel proof-of-concept working demonstrators will be evaluated. By exploring a diverse range of methods, significant enhancements to both data rate and distance can be expected. Our thermodynamics-based approach represents a new paradigm in the sense that 19th century physics can be exploited with 20th century multiplexing concepts for low-cost 21st century ubiquitous security and defence applications in the thermal infrared range.

  5. A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications

    Directory of Open Access Journals (Sweden)

    Zhang Yanbing

    2009-01-01

    Full Text Available Recent research reveals that information security and information-hiding capabilities can be enhanced by proper exploitation of space-time techniques. Meanwhile, intrinsic properties of ultra-wideband (UWB signals make it an outstanding candidate for secure applications. In this paper, we propose a space-time coding scheme for impulse radio UWB systems. A novel real orthogonal group code is designed for multi-antenna UWB signals to exploit the full spatial diversity gain and achieve the perfect communication secrecy. Its performance in a frequency-selective fading channel is analyzed. The transmission secrecy, including low probability of detection (LPD, low probability of intercept (LPI, and anti-jamming performance, is investigated, and some fundamental tradeoffs between these secrecy metrics are also addressed. A comparison of the proposed scheme with the direct sequence spread spectrum (DSSS technique is carried out, which demonstrates that proper combination of UWB and space-time coding can provide substantial enhancement to wireless secure communications over other concurrent systems.

  6. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  7. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  8. Using discriminant analysis to detect intrusions in external communication for self-driving vehicles

    Directory of Open Access Journals (Sweden)

    Khattab M.Ali Alheeti

    2017-08-01

    Full Text Available Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS and black hole attacks on vehicular ad hoc networks (VANETs. The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA and Quadratic Discriminant Analysis (QDA which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection.

  9. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  10. Improved Vehicular Information Network Architecture Using Fuzzy Based Named Data NetworkingNDN

    Directory of Open Access Journals (Sweden)

    Kanwalpreet Kaur

    2015-08-01

    Full Text Available Vehicular Ad-hoc System VANETs is really a component with smart transport systems. It has ability to prevent accidents and the road congestion issues on highways but it suffers from the accomplishment and scalability issues. To handle these difficulties from the Inter Vehicular Communication IVC we apply Name Data Networking NDN. All though in NDN the users are only concerned about necessary data and give no attention on the number of locations from where the data is coming. The NDN layout is usually much more worthy for IVC circumstance getting the ordered material labeling design as well as amp64258exible material retrieval. In this report we propose vehicular network dependent on fuzzy membership function which offers the fundamental NDN style to improve support location dependent forwarding content aggregation and distributed mobility management. This paper finally winds up the several boundaries regarding earlier approaches.

  11. Text messaging to communicate with public health audiences: how the HIPAA Security Rule affects practice.

    Science.gov (United States)

    Karasz, Hilary N; Eiden, Amy; Bogan, Sharon

    2013-04-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals' needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.

  12. Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Huang, Zhan-Zhan; Grebogi, Celso

    An experimental secure communication method based on the Chen system with time-delay is being proposed in this paper. The Chen system with time-delay is an infinite-dimensional system having more than one positive Lyapunov exponent. The message to be transmitted is encrypted using an hyperchaotic signal generated by the Chen system with time-delay and multishift cipher function. This encryption makes difficult for an eavesdropper to reconstruct the attractor by using time-delay embedding techniques, return map reconstruction, or spectral analysis, consequently, improving the security. Simulations and experiments on TI TMS320C6713 Digital Signal Processor (DSP) show improved resilience against attack and the feasibility of the proposed scheme.

  13. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  14. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  15. Bidirectional Coupling Scheme of Chaotic Systems and its Application in Secure Communication System

    Directory of Open Access Journals (Sweden)

    Aceng Sambas

    2014-09-01

    Full Text Available In this paper, in order to show some interesting phenomena of three dimensional autonomous ordinary differential equations, the chaotic behavior as a function of a variable control parameter, has been studied. The initial study in this paper is to analyze the phase portraits, the Lyapunov exponents, the Poincaré maps and the bifurcation diagrams. Moreover, some appropriate comparisons are made to contrast some of the existing results. Finally, the effectiveness of the bidirectional coupling scheme between two identical Jerk circuits in a secure communication system is presented in details. Finally, the simulation results are shown to demonstrate that the proposed method is correct and feasible

  16. A two-step quantum secure direct communication protocol with hyperentanglement

    Science.gov (United States)

    Gu, Bin; Huang, Yu-Gai; Fang, Xia; Zhang, Cheng-Yi

    2011-10-01

    We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol.

  17. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  18. Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State

    Directory of Open Access Journals (Sweden)

    Jian Li

    2015-09-01

    Full Text Available A novel quantum secure direct communication protocol based on four-particle genuine entangled state and quantum dense coding is proposed. In this protocol, the four-particle genuine entangled state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. Finally, the security of the proposed protocol is discussed. During the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by comparing the relationship between the maximal information that the eavesdroppers (Eve can obtain, and the probability of being detected. Through the analysis we can state that our scheme is feasible and secure.

  19. Grassroots Engagement: Securing Support for Science Communication Training Programs Created by Graduate Students for Graduate Students

    Science.gov (United States)

    Rohde, J. A.

    2016-12-01

    The need for science communication and outreach is widely recognized throughout the scientific community. Yet, at present, graduate students and early career scientists have, at best, widely variable access to opportunities to train in science communication techniques and to hone their outreach skills. In 2010, a small group of graduate students at the University of Washington led a grassroots effort to increase their own access to communication and outreach training by creating "The Engage Program." They developed a novel, interdisciplinary curriculum focused on storytelling, public speaking and improvisation, design, and the distillation of complex topics to clear and accessible forms. These entrepreneurial students faced (real or perceived) barriers to building this program, including the pressure to hide or dampen their enthusiasm from advisors and mentors, ignorance of university structures, and lack of institutional support. They overcame these barriers and secured institutional champions and funding, partnered with Town Hall Seattle to create a science speaker series, and developed a student leadership structure to ensure long-term sustainability of the program. Additionally, they crowdfunded an evaluation of the program's effectiveness in order demonstrate the benefits of such training to the scientific careers of the students. Here we present our key strategies for overcoming barriers to support, and compare them with several similar grassroots graduate-student led public communication programs from other institutions.

  20. Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment

    Science.gov (United States)

    Rabadan, Jose; Perez-Jimenez, Rafael

    2017-01-01

    Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. PMID:29186184

  1. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    Science.gov (United States)

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  2. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    Directory of Open Access Journals (Sweden)

    Mauricio Zapateiro De la Hoz

    2015-01-01

    Full Text Available Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  3. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  4. Design and Numerical Simulation of Unidirectional Chaotic Synchronization and its Application in Secure Communication System

    Directory of Open Access Journals (Sweden)

    A. Sambas

    2013-09-01

    Full Text Available Chaotic systems are characterized by sensitive dependence on initial conditions, similar to random behavior, and continuous broad-band power spectrum. Chaos is a good potential to be used in secure communications system. In this paper, in order to show some interesting phenomena of three-order Jerk circuit with modulus nonlinearity, the chaotic behavior as a function of a variable control parameter, has been studied. The initial study in this paper is to analyze the phase portraits, the Poincaré maps, the bifurcation diagrams, while the analysis of the synchronization in the case of unidirectional coupling between two identical generated chaotic systems, has been presented. Moreover, some appropriate comparisons are made to contrast some of the existing results. Finally, the effectiveness of the unidirectional coupling scheme between two identical Jerk circuits in a secure communication system is presented in details. Integration of theoretical physics, the numerical simulation by using MATLAB 2010, as well as the implementation of circuit simulations by using MultiSIM 10.0 has been performed in this study

  5. Securing electronic medical record in Near Field Communication using Advanced Encryption Standard (AES).

    Science.gov (United States)

    Renardi, Mikhael Bagus; Basjaruddin, Noor Cholis; Rakhman, Edi

    2017-12-29

    Doctors usually requires patients' medical records before medical examinations. Nevertheless, obtaining such records may take time. Hence, Near Field Communication (NFC) could be used to store and send medical records between doctors and patients. Another issue is that there could be a threat such as, Man In The Middle Attack and eavesdropping, thus, a security method is required to secure the data. Furthermore, the information regarding the key and initialisation vector in NFC cannot be sent using one data package, hence, the data transmission should be done several times. Therefore, the initialisation vector that changed in each transmission is implemented, and the key utilised is based on the component agreed by both parties. This study aims at applying the cryptography process that does disturb and hinder the speed of data transmission. The result demonstrated that the data transmitted could be secured and the encryption process did not hinder data exchange. Also, different number of characters in plaintexts required different amount of time for encryption and decryption. It could be affected by the specifications of the devices used and the processes happening in the devices.

  6. COMMUNICATING DEFENSE AND SECURITY IN ROMANIA DURING THE UKRAINIAN CRISIS (NOVEMBER 2013 - SEPTEMBER 2014

    Directory of Open Access Journals (Sweden)

    Viorel MIHAILĂ

    2014-10-01

    Full Text Available This paper analyzes the main themes and patterns used by Romanian communication programs on defense and security during the Ukrainian crises, from November 2013 until the ceasefire of September 5th. Acknowledging the change made in the Romanian leadership’s understanding of the security concept during the last 25 years of country’s transition from communism to democracy, the study found out that the narrative used by the Romanian institutions might lead to a new understanding on whose job is to protect the country in case of a military aggression. Currently, the bearer of this responsibility appears to be, for Romanians, the North Atlantic Treaty Organization (NATO, the European Union (EU and the Romanians themselves, in this order. For the timeframe analyzed, for what is spoken and written in the media by the politicians and, afterwards, re-represented by the general public (developed by opinion pools it seems that for the military dimension, the security responsibility was somehow outsourced.

  7. Vehicular Networking Enhancement And Multi-Channel Routing Optimization, Based on Multi-Objective Metric and Minimum Spanning Tree

    Directory of Open Access Journals (Sweden)

    Peppino Fazio

    2013-01-01

    Full Text Available Vehicular Ad hoc NETworks (VANETs represent a particular mobile technology that permits the communication among vehicles, offering security and comfort. Nowadays, distributed mobile wireless computing is becoming a very important communications paradigm, due to its flexibility to adapt to different mobile applications. VANETs are a practical example of data exchanging among real mobile nodes. To enable communications within an ad-hoc network, characterized by continuous node movements, routing protocols are needed to react to frequent changes in network topology. In this paper, the attention is focused mainly on the network layer of VANETs, proposing a novel approach to reduce the interference level during mobile transmission, based on the multi-channel nature of IEEE 802.11p (1609.4 standard. In this work a new routing protocol based on Distance Vector algorithm is presented to reduce the delay end to end and to increase packet delivery ratio (PDR and throughput in VANETs. A new metric is also proposed, based on the maximization of the average Signal-to-Interference Ratio (SIR level and the link duration probability between two VANET nodes. In order to relieve the effects of the co-channel interference perceived by mobile nodes, transmission channels are switched on a basis of a periodical SIR evaluation. A Network Simulator has been used for implementing and testing the proposed idea.

  8. Intervehicle Communication Research – Communication Scenarios

    Directory of Open Access Journals (Sweden)

    Šarūnas Stanaitis

    2011-03-01

    Full Text Available Recently intervehicle communications are attracting much attention from industry and academia. Upcoming standard for intervehicle communication IEEE 802.11p, known as Wireless Access in Vehicular Environments (WAVE, is still in its draft stage, but already coming into final standardization phase. Problematic, regarding mobile WAVE nodes, are described in several articles, simulations prepared and experiments done. But most of these works do not consider possible maximal communication load. This paper presents intervehicle communication scenario in respect to radio communications, mobility and other aspects of vehicular environments.Article in English

  9. TRUSTED DATA COMMUNICATION AND SECURITY ISSUES IN GNSS NETWORK OF TURKEY

    Directory of Open Access Journals (Sweden)

    S. Bakici

    2017-11-01

    Full Text Available There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr, Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department’s specialists since 2005. TUSAGA-Aktif (CORS-Tr System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  10. Trusted Data Communication and Security Issues in Gnss Network of Turkey

    Science.gov (United States)

    Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.

    2017-11-01

    There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  11. Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels

    Directory of Open Access Journals (Sweden)

    Hongji Huang

    2017-01-01

    Full Text Available This paper studies the relay selection schemes in mobile communication system over Nakagami-m channel. To make efficient use of licensed spectrum, both single relay selection (SRS scheme and multirelays selection (MRS scheme over the Nakagami-m channel are proposed. Also, the intercept probability (IP and outage probability (OP of the proposed SRS and MRS for the communication links depending on realistic spectrum sensing are derived. Furthermore, this paper assesses the manifestation of conventional direct transmission scheme to compare with the proposed SRS and MRS ones based on the Nakagami-m channel, and the security-reliability trade-off (SRT performance of the proposed schemes and the conventional schemes is well investigated. Additionally, the SRT of the proposed SRS and MRS schemes is demonstrated better than that of direct transmission scheme over the Nakagami-m channel, which can protect the communication transmissions against eavesdropping attacks. Additionally, simulation results show that our proposed relay selection schemes achieve better SRT performance than that of conventional direct transmission over the Nakagami-m channel.

  12. Vehicular Platooning: Multi-Layer Consensus Seeking

    NARCIS (Netherlands)

    Fusco, M.; Semsar Kazerooni, E.; Ploeg, J.; Wouw, N. van de

    2016-01-01

    In this paper, a novel Multi-Layer Consensus Seeking (MLCS) framework is proposed, focusing on the vehicular platooning problem. The vehicles are described by linear heterogeneous dynamics. For example, we consider thirdorder systems, however the algorithms discussed are suitable for any

  13. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  14. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  15. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  16. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  17. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  18. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-01-01

    Full Text Available Background: This study integrates the diffusion of innovation, technology acceptance model and Hofstede’s cultural dimensions theory to assess the role that information and communications technology (ICT plays in ensuring food security. A survey of smallholder farmers from the iLembe district municipality of the KwaZulu-Natal Province of South Africa was conducted, and the data were used to test the proposed model.Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory.Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques.Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons.Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies

  19. Comparative Overview of UWB and VLC for Data- Intensive and Security-Sensitive Applications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Mihovska, Albena D.; Cianca, Ernestina

    2012-01-01

    This paper provides a comparative overview of two short-range wireless technologies with high potential for use in various data-intensive and security-sensitive applications, namely, ultra wideband (UWB) and visible light communications (VLC). Both are emerging technologies with some unique...... and standardization developments for both technologies and gives a proposal for their suitability based on a comparative view, of the strengths and weaknesses for use in applications, such as home networking, vehicular communications, and medical care, including the main technical challenges....

  20. NATO CCMS Workshop on Smart Materials for Energy, Communications and Security (SMECS)

    CERN Document Server

    Mezzane, Daoud

    2008-01-01

    Rapid evolution of trade, cultural and human relations provides the qualitative and quantitative enhancement of international collaborations, linking the countries with different economical and technological level. Delocalization of High-Tech industry inevitably leads to development of the material science and engineering researches in emergent countries, requiring transfer of know-how, restructuration of basic research and educational networks. This book presents the contributions of participants of the Advanced Research Workshop “Smart Materials for Energy, Communications and Security” (ARW SMECS; www.smecs.ferroix.net), organized in December 2007 in Marrakech in frame of the “NATO - Science for Peace” program. The objective of this event was the attempt to overview several hot topics of material physics related with problems of modern society: transformation and storage of energy, treatment and transmission of information, environmental security issues etc., with the focus of their implementation i...

  1. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    Science.gov (United States)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  2. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  3. Demonstration of 2.5 Gbit/sec free space optical communication by using Y-00 cipher: toward secure aviation systems

    Science.gov (United States)

    Futami, Fumio; Hirota, Osamu

    2014-09-01

    Wireless communication of aviation contains high capacity confidential information and therefore such communication requires secure high speed data communication scheme by using reliable cipher. In this report, the authors propose free space optical communication by utilizing optical intensity-modulated Y-00 cipher for applications of secure aviation systems including unmanned aircraft systems. Y-00 cipher transmitter and receiver with intensity levels of 4096 at data rate of 2.5 Gbit/s are fabricated for secure free space optical communication and a free space Y-00 cipher transmission is experimentally demonstrated.

  4. Secure Military Communications on 3G, 4G and WiMAX

    Science.gov (United States)

    2013-09-01

    mobile stations. The security relies on a removable card, called the UMTS integrated security card, and security applications, like USIM, CSIM ( CDMA ... Mobile Security and User Confidentiality for UMTS (EMSUCU) Evaluation ................. 74 3. Secure-Authentication Key Agreement Protocol...27 Figure 11. Mobile WiMAX network, from [9]. ....................................................... 28 Figure 12

  5. Ensuring the security and privacy of information in mobile health-care communication systems

    Directory of Open Access Journals (Sweden)

    Ademola P. Abidoye

    2011-09-01

    Full Text Available The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information.

  6. Noise in the wire: the real impact of wire resistance for the Johnson (-like) noise based secure communicator

    OpenAIRE

    Kish, Laszlo B.; Scheuer, Jacob

    2010-01-01

    We re-evaluate the impact of wire resistance on the noise voltage and current in the Johnson-(like)-noise based secure communicator, correcting the result presented in [Physics Letters A 359 (2006) 737]. The analysis shown here is based on the fluctuation-dissipation and the linear response theorems. The results indicate that the impact of wire resistance in practical communicators is significantly lower than the previous estimation.

  7. The Communicative Dimension and Security in Asia-Pacific: A communicative-viewing proposal for reform of the Japanese Intelligence Services

    Directory of Open Access Journals (Sweden)

    Juan L. López-Aranguren

    2016-05-01

    Full Text Available The postwar development of the Intelligence Services in Japan has been based on two contrasting models: the centralized model of the USA and the collegiality of UK, neither of which has been fully developed. This has led to clashes of institutional competencies and poor anticipation of threats towards national security. This problem of opposing models has been partially overcome through two dimensions: externally through the cooperation with the US Intelligence Service under the Treaty of Mutual Cooperation and Security; and internally though the pre-eminence in the national sphere of the Department of Public Safety. However, the emergence of a new global communicative dimension requires that a communicative-viewing remodeling of this dual model is necessary due to the increasing capacity of the individual actors to determine the dynamics of international events. This article examines these challenges for the Intelligence Services of Japan and proposes a reform based on this new global communicative dimension.

  8. Trusted communications with physical layer security for 5G and beyond

    CERN Document Server

    Duong, Trung Q; Poor, H Vincent

    2017-01-01

    Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

  9. The development of communicative competence of securely and insecurely attached children in interactions with their mothers.

    Science.gov (United States)

    Klann-Delius, G; Hofmeister, C

    1997-01-01

    Coordinated interpersonal timing in preverbal mother-child interactions is assumed to be one fundamental feature of interpersonal relatedness and the basis for parent-child bonding. The ubiquity of and early evidence for this phenomenon in ontogeny hint at its biological "prewiredness" and relevance for development. The quality of interpersonal timing in early preverbal parent-child interactions was hypothesized (and partially shown) to predict quality of attachment, level of cognitive functioning, and patterns of language acquisition. The aim of this study was to investigate the assumption of a facilitating effect of adequate interpersonal coordination (measured by quality of attachment) on the development of verbal communicative competence in children during the first stages of language development. On the basis of longitudinal data for 25 mother-child dyads, videotaped when the children were 17, 23, 30, and 36 months old in a free play and a short separation situation, it was investigated whether securely and insecurely attached children differ with respect to the amount of verbal contributions, their realization as alternating or simultaneous utterances, and the duration of intra-turn and inter-turn pauses. The results show that attachment was related to children's use of communicative competence especially in stressful situations, its development being paced by the age or maturation of the child.

  10. Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI

    Science.gov (United States)

    Li, Qiang; Zhang, Ying; Lin, Jingran; Wu, Sissi Xiaoxiao

    2017-09-01

    Consider a full-duplex (FD) bidirectional secure communication system, where two communication nodes, named Alice and Bob, simultaneously transmit and receive confidential information from each other, and an eavesdropper, named Eve, overhears the transmissions. Our goal is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions by optimizing the transmit covariance matrices at Alice and Bob. To tackle this SSR maximization (SSRM) problem, we develop an alternating difference-of-concave (ADC) programming approach to alternately optimize the transmit covariance matrices at Alice and Bob. We show that the ADC iteration has a semi-closed-form beamforming solution, and is guaranteed to converge to a stationary solution of the SSRM problem. Besides the SSRM design, this paper also deals with a robust SSRM transmit design under a moment-based random channel state information (CSI) model, where only some roughly estimated first and second-order statistics of Eve's CSI are available, but the exact distribution or other high-order statistics is not known. This moment-based error model is new and different from the widely used bounded-sphere error model and the Gaussian random error model. Under the consider CSI error model, the robust SSRM is formulated as an outage probability-constrained SSRM problem. By leveraging the Lagrangian duality theory and DC programming, a tractable safe solution to the robust SSRM problem is derived. The effectiveness and the robustness of the proposed designs are demonstrated through simulations.

  11. Secure Intra-Body Wireless Communications (SIWiC) System Project

    Science.gov (United States)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  12. eHealth Service Support in Future IPv6 Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Véronique Vèque

    2013-06-01

    Full Text Available Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X, large scale deployments, machine-to-machine (M2M integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages.

  13. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  14. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  15. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  16. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  18. Efficiency in the transmission of information through digital imaging and communications in medicine using security mechanisms: tests with DISCUS.

    Science.gov (United States)

    Pérez, Juan L; Servia, Francisco; Mato, Virginia; Vázquez, José Manuel; Pereira, Javier; Dorado, Julian; Díaz, Juan; Novoa, Francisco J; Pazos, Alejandro

    2010-06-01

    This article describes our experience in using a Picture Archiving and Communications System, known as Secure Medical Image Information System, based on the Digital Imaging and Communications in Medicine standard that supports the use of secure transmissions, from the point of view of how the use of secure sending methods has an effect on the efficiency in the transmission according to the network employed, to quantify productivity loss due to the encryption, the secure transmission, and the subsequent decryption. To test the Secure Medical Image Information System, a series of medical data transmission were conducted from A Coruña (Spain) to the Virgen de las Nieves Hospital, situated 1,000 km away, in Granada (Spain). Once we studied the networking infrastructure of the hospital and its available image generation devices, we subsequently carried out a series of measurements during the transmissions, which allowed us to analyze the behavior of the system with different network schemes and connection speeds. The results obtained from these investigations demonstrate that the impact of secure data-sending methods on the productivity of the system is higher in networks whose capacities are higher and it is not affected by sending data during different periods in the day. In this regard, the presented approach may serve as a model for other small, and possibly mid-sized, medical centers.

  19. Passive magnetic bearings for vehicular electromechanical batteries

    Energy Technology Data Exchange (ETDEWEB)

    Post, R

    1996-03-01

    This report describes the design of a passive magnetic bearing system to be used in electromechanical batteries (flywheel energy storage modules) suitable for vehicular use. One or two such EMB modules might, for example, be employed in a hybrid-electric automobile, providing efficient means for power peaking, i.e., for handling acceleration and regenerative braking power demands at high power levels. The bearing design described herein will be based on a ''dual-mode'' operating regime.

  20. Impact of Vehicular Networks on Emergency Medical Services in Urban Areas

    OpenAIRE

    Chun-Liang Lee; Chung-Yuan Huang; Tzu-Chien Hsiao; Chun-Yen Wu; Yaw-Chung Chen; I.-Cheng Wang

    2014-01-01

    The speed with which emergency personnel can provide emergency treatment is crucial to reducing death and disability among acute and critically ill patients. Unfortunately, the rapid development of cities and increased numbers of vehicles are preventing emergency vehicles from easily reaching locations where they are needed. A significant number of researchers are experimenting with vehicular networks to address this issue, but in most studies the focus has been on communication technologies...

  1. A collaborative protocol for anonymous reporting in vehicular ad hoc networks

    OpenAIRE

    Tripp Barba, Carolina; Urquiza Aguiar, Luis; Aguilar Igartua, Mónica; Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge; Pallarès Segarra, Esteve

    2013-01-01

    Vehicular ad hoc networks (VANETs) have emerged to leverage the power of modern communication technologies, applied to both vehicles and infrastructure. Allowing drivers to report traffic accidents and violations through the VANET may lead to substantial improvements in road safety. However, being able to do so anonymously in order to avoid personal and professional repercussions will undoubtedly translate into user acceptance. The main goal of this work is to propose a new collaborative prot...

  2. Connectivity of vehicular ad hoc networks with continuous node distribution patterns

    OpenAIRE

    Jin, W L; Wang, Bruce

    2010-01-01

    The connectivity of vehicular ad hoc networks (VANets) can be affected by the special distribution patterns, usually dependent and non-uniform, of vehicles in a transportation network. In this study, we introduce a new framework for computing the connectivity in a VANet for continuous distribution patterns of communication nodes on a line in a transportation network. Such distribution patterns can be estimated from traffic densities obtained through loop detectors or other detectors. When com...

  3. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2013-03-01

    Full Text Available Nowadays; modern Hospital Data Management Systems (HDMSs are applied in a computer network; in addition medicinal equipments produce medical images in a digital form. HDMS must store and exchange these images in a secured environment to provide image integrity and patient privacy. The reversible watermarking techniques can be used to provide the integrity and the privacy. In this paper, a security technique based on watermarking and encryption is proposed to be used for Digital Imaging and Communications in Medicine (DICOM. It provides patient authentication, information confidentiality and integrity based on reversible watermark. To achieve integrity service at the sender side; a hash value based on encrypted MD5 is determined from the image. And to satisfy the reversible feature; R–S-Vector is determined from the image and is compressed based on a Huffman compression algorithm. After that to provide confidentiality and authentication services: the compressed R–S-Vector, the hash value and patient ID are concatenated to form a watermark then this watermark is encrypted using AES encryption technique, finally the watermark is embedded inside the medical image. Experimental results prove that the proposed technique can provide patient authentication services, image integrity service and information confidentiality service with excellent efficiency. Concluded results for all tested DICOM medical images and natural images show the following: BER equals 0, both of SNR and PSNR are consistent and have large values, and MSE has low value; the average values of SNR, PSNR and MSE are 52 dB, 57 dB and 0.12 respectively. Therefore, watermarked images have high imperceptibility, invisibility and transparency. In addition, the watermark extracted from the image at the receiver side is identical to the watermark embedded into the image in the sender side; as a result, the proposed technique is totally reversible, and the embedded watermark does not

  4. A reinforcement sensor embedded vertical handoff controller for vehicular heterogeneous wireless networks.

    Science.gov (United States)

    Li, Limin; Xu, Yubin; Soong, Boon-Hee; Ma, Lin

    2013-11-04

    Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN). Moreover, for the media access control (MAC) scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS) embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience.

  5. A Reinforcement Sensor Embedded Vertical Handoff Controller for Vehicular Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Ma

    2013-11-01

    Full Text Available Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN. Moreover, for the media access control (MAC scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience.

  6. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  7. Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks

    Science.gov (United States)

    Qu, Junyue; Cai, Yueming; Wu, Dan; Chen, Hualiang

    2014-05-01

    The problem of power allocation for device-to-device (D2D) underlay communication to improve physical layer security is addressed. Specifically, to improve the secure communication of the cellular users, we introduce a Stackelberg game for allocating the power of the D2D link under a total power constraint and a rate constraint at the D2D pair. In the introduced Stackelberg game the D2D pair works as a seller and the cellular UEs work as buyers. Firstly, because the interference signals from D2D pair are unknown to both the legitimate receiver and the illegitimate eavesdropper, it is possible that a cellular UE decline to participate in the introduced Stackelberg game. So the condition under which a legitimate user will participate in the introduced Stackelberg game is discussed. Then, based on the Stackelberg game, we propose a semi-distributed power allocation algorithm, which is proved to conclude after finite-time iterations. In the end, some simulations are presented to verify the performance improvement in the physical layer security of cellular UEs using the proposed power allocation algorithm. We can determine that with the proposed algorithm, while the D2D pair's communication demand is met, the physical layer security of cellular UEs can be improved.

  8. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  9. Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration’s Next Generation Air Transportation System

    Science.gov (United States)

    2014-03-01

    the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air...message and is typically measured in bits per byte [63]. In addition to security considerations, the computational performance of the candidate algorithms...between the input of a plaintext and the output of 36 its ciphertext. Device utilization is assesed by the number of FPGA components used to synthesize

  10. A statistical approach to vehicular traffic

    Science.gov (United States)

    Freund, Jan; Pöschel, Thorsten

    1995-02-01

    A two-dimensional cellular automaton is introduced to model the flow and jamming of vehicular traffic in cities. Each site of the automaton represents a crossing where a finite number of cars can wait approaching the crossing from each of the four directions. The flow of cars obeys realistic traffic rules. We investigate the dependence of the average velocity of cars on the global traffic density. At a critical threshold for the density the average velocity reduces drastically caused by jamming. For the low-density regime we provide analytical results which agree with the numerical results.

  11. 1st International Workshop on Vehicular Ad-hoc Networks for Smart Cities

    CERN Document Server

    Qayyum, Amir; Saad, Mohamad

    2015-01-01

    Vehicular communication is a key technology in intelligent transportation systems. For many years now, the academic and industrial research communities have been investigating these communications in order to improve efficiency and safety of future transportation. Vehicular networking offers a wide variety of applications, including safety applications as well as infotainment applications. This book highlights the recent developments in vehicular networking technologies and their interaction with future smart cities in order to promote further research activities and challenges. SAADI BOUDJIT, University of Paris 13, France  HAKIMA CHAOUCHI, Telecom SudParis, France  YACINE GHAMRI, University La Rochelle, France HALABI HASBULLAH, Universiti Teknologi Petronas, Malaysia ANIS LAOUITI, Telecom SudParis, France  SAOUCENE MAHFOUDH, Jeddah, Saudi Arabia  PAUL MUHLETHALER, INRIA, France AMIR QAYYUM, Mohamad Ali Jinnah University, Pakistan NAUFAL SAAD, Universiti Teknologi�...

  12. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  13. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  14. Local Optimization Strategies in Urban Vehicular Mobility.

    Directory of Open Access Journals (Sweden)

    Pierpaolo Mastroianni

    Full Text Available The comprehension of vehicular traffic in urban environments is crucial to achieve a good management of the complex processes arising from people collective motion. Even allowing for the great complexity of human beings, human behavior turns out to be subject to strong constraints--physical, environmental, social, economic--that induce the emergence of common patterns. The observation and understanding of those patterns is key to setup effective strategies to optimize the quality of life in cities while not frustrating the natural need for mobility. In this paper we focus on vehicular mobility with the aim to reveal the underlying patterns and uncover the human strategies determining them. To this end we analyze a large dataset of GPS vehicles tracks collected in the Rome (Italy district during a month. We demonstrate the existence of a local optimization of travel times that vehicle drivers perform while choosing their journey. This finding is mirrored by two additional important facts, i.e., the observation that the average vehicle velocity increases by increasing the travel length and the emergence of a universal scaling law for the distribution of travel times at fixed traveled length. A simple modeling scheme confirms this scenario opening the way to further predictions.

  15. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  16. Analytical and Numerical Study of the Projective Synchronization of the Chaotic Complex Nonlinear Systems with Uncertain Parameters and Its Applications in Secure Communication

    Directory of Open Access Journals (Sweden)

    Kholod M. Abualnaja

    2014-01-01

    to demonstrate the effectiveness of the proposed synchronization scheme and verify the theoretical results. The above results will provide theoretical foundation for the secure communication applications based on the proposed scheme.

  17. Security Concerns and Countermeasures in Network Coding Based Communications Systems: A Survey

    DEFF Research Database (Denmark)

    Nazari Talooki, Vahid; Bassoli, Riccardo; Lucani Rötter, Daniel Enrique

    2015-01-01

    This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety applications in enhancing current traditional networks. In particular, we analyze two...... key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active....... This paper also presents a detailed taxonomy and a timeline of the different NC security mechanisms and schemes reported in the literature. Current proposed security mechanisms and schemes for NC in the literature are classified later. Finally a timeline of these mechanism and schemes is presented....

  18. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  19. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  20. Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-03-01

    A controlled deterministic secure quantum communication (CDSQC) protocol is proposed based on three-particle GHZ state in X-basis. Only X-basis and Z1Z2X3-basis (composed of Z-basis and X-basis) measurement are required, which makes the scheme more convenient than others in practical applications. By distributing a random key between both sides of the communication and performing classical XOR operation, we realize a one-time-pad scheme, therefore our protocol achieves unconditional secure. Because only user with legitimate identity string can decrypt the secret, our protocol can resist man-in-the middle attack. The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping. The detection rate reaches 75% per qubit. Supported by the National Natural Science Foundation of China under Grant No. 61402058, Science and Technology, Sichuan Province of China under Grant No. 2013GZX0137, Fund for Young Persons Project of Sichuan Province of China under Grant No. 12ZB017, and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No. szjj2014-074

  1. The quest for public health security at Hajj: the WHO guidelines on communicable disease alert and response during mass gatherings.

    Science.gov (United States)

    Ahmed, Qanta A; Barbeschi, Maurizio; Memish, Ziad A

    2009-07-01

    Public health security, the provision of safeguarding health and safety for a designated population during a specific event, is paramount to the success of all mass gatherings (MG). Hajj, the pilgrimage to Makkah, Saudi Arabia - one of the largest annual MG - this year hosted over 2.5 million. Hajj presents an annual public health security challenge of extraordinary dimensions, not only due to its scale but also due to Hajj-specific environmental and host factors. Opportunities for sharing public health security insights from Hajj are limited by the lack of standardized outcome measures. The June 2008 WHO Guidelines on communicable disease alert and response for mass gatherings offer novel opportunities for both Hajj planning and assessment. We discuss the evolution of these Guidelines and the first assessment of their efficacy in a live MG environment. We examine potential opportunities for applying these Guidelines in the novel, intensely dynamic, annually recurrent Hajj environment. We believe Hajj-related findings and outcome measurements using these Guidelines will translate broadly to be of value to many non-Hajj MG sectors. Finally, we suggest areas for outcome assessment and future enquiry and invite the first Hajj-specific communicable disease alert guidelines.

  2. Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    NARCIS (Netherlands)

    Knapik, Peter; Schoch, Elmar; Kargl, Frank

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are

  3. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    Science.gov (United States)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  4. Communications and Information: Operational Instruction for the Secure Telephone Unit (STU-III) Type 1

    Science.gov (United States)

    1998-02-01

    Powers Europe SRO—STU-III Responsible Officer STU—Secure Telephone Unit TELCO —Telephone Company TPI—Two-Person Integrity UCMJ—Uniform Code of Military...method for auditing information transfers. A8.3.11. Install STU-IIIs with lock-down security brackets, hard wired to the telephone company ( TELCO ) line...or equipped with a tamper resistant TELCO line connector device to limit relocation of a terminal without proper authorization. A8.4. System

  5. A Vehicular Guidance Wireless Sensor/Actuator Network

    KAUST Repository

    Boudellioua, Imene

    2012-07-01

    Sensor networks have been heralded as one of 21 most important technologies for the 21st century by Business Week [1]. Wireless sensor/actuator networks (WSANs)are emerging as a new generation of sensor networks with the potential for enhancing the versatility and effectiveness of sensor networks. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. In this thesis, we design a WSAN for a vehicular guidance system targeting environmental disaster management applications. In this system, actuators provide mobility to all sensor nodes in the observed area whenever needed. Moreover, nodes form clusters and their movement is controlled by a master node that is selected dynamically. We also discuss the factors affecting our network performance in real-life and propose a framework which accounts for real-time requirement and reliable actuation. We finally perform some experimental studies on our system to measure its performance in an indoor environment.

  6. Autonomous Car Parking System through a Cooperative Vehicular Positioning Network.

    Science.gov (United States)

    Correa, Alejandro; Boquet, Guillem; Morell, Antoni; Lopez Vicario, Jose

    2017-04-13

    The increasing development of the automotive industry towards a fully autonomous car has motivated the design of new value-added services in Vehicular Sensor Networks (VSNs). Within the context of VSNs, the autonomous car, with an increasing number of on-board sensors, is a mobile node that exchanges sensed and state information within the VSN. Among all the value added services for VSNs, the design of new intelligent parking management architectures where the autonomous car will coexist with traditional cars is mandatory in order to profit from all the opportunities associated with the increasing intelligence of the new generation of cars. In this work, we design a new smart parking system on top of a VSN that takes into account the heterogeneity of cars and provides guidance to the best parking place for the autonomous car based on a collaborative approach that searches for the common good of all of them measured by the accessibility rate, which is the ratio of the free parking places accessible for an autonomous car. Then, we simulate a real parking lot and the results show that the performance of our system is close to the optimum considering different communication ranges and penetration rates for the autonomous car.

  7. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.

    Science.gov (United States)

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-07-11

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.

  8. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines

    Science.gov (United States)

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-01-01

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390

  9. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2017-07-01

    Full Text Available Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.

  10. Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2004-01-01

    .... They present an analytical formulation of the energy expenditure associated with the communication overhead of key management, and highlight its dependence on network topology and key distribution method...

  11. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  12. National Security/Emergency Preparedness and Disaster Recovery Communications Via ACTS

    Science.gov (United States)

    Pasqualino, Christopher R.; Abbe, Brian S.; Dixon, Frank

    1996-01-01

    During the period from early 1993 through 1994, the U.S. National Communication System, a government agency, sponsored the development and execution of several fixed and mobile experiments using the Advanced Communications Technology Satellite (ACTS)...The results of these experiments are described in this paper.

  13. Modular, Cost-Effective, Extensible Avionics Architecture for Secure, Mobile Communications

    Science.gov (United States)

    Ivancic, William D.

    2007-01-01

    Current onboard communication architectures are based upon an all-in-one communications management unit. This unit and associated radio systems has regularly been designed as a one-off, proprietary system. As such, it lacks flexibility and cannot adapt easily to new technology, new communication protocols, and new communication links. This paper describes the current avionics communication architecture and provides a historical perspective of the evolution of this system. A new onboard architecture is proposed that allows full use of commercial-off-the-shelf technologies to be integrated in a modular approach thereby enabling a flexible, cost-effective and fully deployable design that can take advantage of ongoing advances in the computer, cryptography, and telecommunications industries.

  14. Determination of vehicular pollution in the road tunnel of Vana ...

    African Journals Online (AJOL)

    Determination of vehicular pollution in the road tunnel of Vana (Haraz Road) in the ... source of pollution in a road tunnel, It has a harmful impact on Human health . ... undoubtedly one of the important sources of environmental and air pollution.

  15. FPGA-Based Vehicular Channel Emulator for Real-Time Performance Evaluation of IEEE 802.11p Transceivers

    Directory of Open Access Journals (Sweden)

    Fernández-Caramés TM

    2010-01-01

    Full Text Available IEEE 802.11p is one of the most promising future wireless standards due to the increasing demand of vehicular communication applications. At the time of writing, the document of the standard is in draft and much research is still required to study and improve the performance of transceivers in common vehicular scenarios. In this paper, we present a framework to evaluate the PHY layer of IEEE 802.11p systems in realistic situations. We detail the design and implementation of an FPGA-based real-time vehicular channel emulator. Contrarily to commercial emulators, ours is cheap, very flexible, and reconfigurable. We show its capabilities by evaluating performance in different high-speed scenarios. We also study the importance of coding and the benefits of using IEEE 802.11p instead of IEEE 802.11a in vehicular environments. Towards this aim, we developed a reference IEEE 802.11p PHY transceiver software model that can be taken as a convenient starting point for transceiver design.

  16. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    Energy Technology Data Exchange (ETDEWEB)

    Gadgil, Shrirang [Applied Communication Sciences, Basking Ridge, NJ (United States); Lin, Yow-Jian [Applied Communication Sciences, Basking Ridge, NJ (United States); Ghosh, Abhrajit [Applied Communication Sciences, Basking Ridge, NJ (United States); Samtani, Sunil [Applied Communication Sciences, Basking Ridge, NJ (United States); Kang, Jaewon [Applied Communication Sciences, Basking Ridge, NJ (United States); Siegell, Bruce [Applied Communication Sciences, Basking Ridge, NJ (United States); Kaul, Vikram [Applied Communication Sciences, Basking Ridge, NJ (United States); Unger, John [Applied Communication Sciences, Basking Ridge, NJ (United States); De Bruet, Andre [DTE Energy, Detroit, MI (United States); Martinez, Catherine [DTE Energy, Detroit, MI (United States); Vermeulen, Gerald [DTE Energy, Detroit, MI (United States); Rasche, Galen [Electric Power Research Inst. (EPRI), Palo Alto, CA (United States); Sternfeld, Scott [Electric Power Research Inst. (EPRI), Palo Alto, CA (United States); Berthier, Robin [Univ. of Illinois, Urbana-Champaign, IL (United States); Bobba, Rakesh [Univ. of Illinois, Urbana-Champaign, IL (United States); Campbell, Roy [Univ. of Illinois, Urbana-Champaign, IL (United States); Sanders, Williams [Univ. of Illinois, Urbana-Champaign, IL (United States)

    2014-09-28

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies.

  17. 77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices

    Science.gov (United States)

    2012-06-13

    ... our customers' wireless experience by capturing and analyzing a narrow set of data related to some of the most common issues our customers experience.'' The data collected in this manner may be shared... privacy and data security practices of mobile wireless services providers with respect to customer...

  18. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  19. My, your and our needs for safety and security: relatives' reflections on using information and communication technology in dementia care.

    Science.gov (United States)

    Olsson, Annakarin; Engström, Maria; Skovdahl, Kirsti; Lampic, Claudia

    2012-03-01

    The present paper reports on a study aimed at describing relatives' reflections on different kinds of information and communication technology (ICT) devices that are used or can be used in the daily care of persons with dementia. Many persons with dementia continue living in their own homes, which requires the support of their relatives. One way to meet the needs of relatives and persons with dementia is to use ICT. An interview study was conducted in Sweden (2007-2008) with a purposive sample of 14 spouses of a person with dementia. Qualitative content analysis was used to identify categories and themes in the data. Relatives' reflections on the use of ICT were described as ICT - a support in daily life, ICT - internal and external conditions and ICT - the decision to use or not use. Based on these categories, a theme was revealed: shifting between different perspectives: my, your and our needs for safety and security. Relatives struggle to create a situation of safety and security in daily life for themselves and the persons with dementia. ICT devices with the right functionality and used at the right time are regarded as useful in solving everyday problems. In the decision to use or not use ICT, the opportunity to create a safe and secure environment overshadows potential ethical problems. Providing early information about ICT to persons with dementia and their relatives could facilitate joint decision-making regarding use of ICT. © 2011 The Authors. Scandinavian Journal of Caring Sciences © 2011 Nordic College of Caring Science.

  20. [Development of vehicular emission inventory in China].

    Science.gov (United States)

    Song, Xiang-yu; Xie, Shao-dong

    2006-06-01

    The vehicular emission inventories with high spatial resolution of 40km x 40km are developed using GIS technique based on the statistic data from yearbooks about vehicles and roads at provincial level in China for the year 2002, and on the emission factors calculated by COPERT III model for each category of vehicles in urban, rural and highway traffic. The results show that the emissions of CO, NOx, NMVOC and PM10 are 28.15, 3.05, 4.61 and 1.11 million tons, respectively, principally from motorcycles and gasoline passenger cars. The emissions concentrate on the developed areas and those from 10.8%, 2.2%, 9.7% and 5.3% of country acreage account for 84% of CO, 55% of NMVOC, 48% of NOx, 48% of PM10 emissions, respectively. The emissions in the east of China and coastal areas are higher than those in the west and hinterland areas. The emission source strengths in the Yangtze River Delta, the Pearl River Delta and Beijing & Tianjin area are the highest.

  1. Smart Grid Communications Security Project, U.S. Department of Energy

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Frank [Univ. of Colorado, Boulder, CO (United States)

    2012-09-01

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) This report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.

  2. Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Peterson, C.G.; Twyeffort, E.; Simmons, C.M.; Nordholt, J.E.

    1999-06-03

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmission of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.

  3. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  4. COmmunications and Networking with QUantum Operationally-Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2017-03-06

    progress against tasks. Section B. Planned Activities/Schedule Monthly team meetings have been scheduled and the last monthly meeting was held at...Maximizing the information efficiency of QKD • Task 4: Improved hardware- domain signal processing • Task 5: QKD network via un - trusted quantum... achievable : optimal “attack” not known 55 CV QKD: status of security proofs (contd.) • Input power, reconciliation efficiency, constellation

  5. COmmunications and Networking with QUantum operationally Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2016-12-02

    security analysis for a naval atmospheric link with a realistic eavesdropper The slides attached to this report provide an update regarding Task 1...program we have done some analysis of FL-QKD for the atmospheric channel, and we are beginning to extend that work. Floodlight Quantum Key...at the key distillation step. In single photon detection based QKD, photon detection probability at Bob is propor- tional to the channel transmittance

  6. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    Science.gov (United States)

    2008-06-19

    LEOsat LEO Satellite-based networks LKH Logical Key Hierarchy LPI/D Low Probability of Intercept/Detection LS Link State MAC Message Authentication...stages, or are currently in operation. The late 1990s saw a flurry of activity from numerous entities to meet the needs projected for satellite users...infrastructure digital signatures are a secure way of protecting a system; however, they are also computationally expensive. MACs (Message

  7. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines

    OpenAIRE

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-01-01

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbance...

  8. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-05-01

    Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory. Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques. Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons. Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies. Secondly, the study informs ICT innovation developers on the need to prioritise ease of use of ICT-based interventions when developing innovations that focus on smallholder farmers. The study also contributes to policy guidelines and suggests clear guidelines be developed to address cultural aspects such as gender imbalances.

  9. Secure and robust authentication for DC MicroGrids based on power talk communication

    DEFF Research Database (Denmark)

    Angjelichinoski, Marko; Danzi, Pietro; Stefanovic, Cedomir

    2017-01-01

    - a powerline communication technique executed by the primary control loops of the power electronic converters. In addition, the scheme also promotes direct and active participation of the control system in the authentication process, a feature not commonly encountered in current networked control systems...

  10. Electronic decal: a security function based on V2X communication

    NARCIS (Netherlands)

    Knapik, Peter; Schoch, Elmar; Kargl, Frank

    New technologies such as vehicle-to-X (V2X) communication and advanced driver assistance systems (ADAS) are on the rise. They are mainly used to increase road safety as well as traffic efficiency and to provide customers with infotainment features. However, these new technologies also provide the

  11. The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)

    OpenAIRE

    Stoianov, Nikolai; Aleksandrova, Veselina

    2010-01-01

    This paper presents one suggestion that comprises the authors' experience in development and implementation of systems for information security in the Automated Information Systems of the Bulgarian Armed Forces. The architecture of risk analysis and assessment system for the communication and information system's information security (CIS IS) has been presented. E-net model of "Defining" Subsystem as a tool that allows to examine the subsystems is proposed as well. Such approach can be applie...

  12. Metabolic assessments during extra-vehicular activity

    Science.gov (United States)

    Osipov, Yu. Yu.; Spichkov, A. N.; Filipenkov, S. N.

    Extra-vehicular activity (EVA) has a significant role during extended space flights. It demonstrates that humans can survive and perform useful work outside the Orbital Space Stations (OSS) while wearing protective space suits (SS). When the International Space Station 'Alpha'(ISSA) is fully operational, EVA assembly, installation, maintenance and repair operations will become an everyday repetitive work activity in space. It needs new ergonomic evaluation of the work/rest schedule for an increasing of the labor amount per EVA hour. The metabolism assessment is a helpful method to control the productivity of the EVA astronaut and to optimize the work/rest regime. Three following methods were used in Russia to estimate real-time metabolic rates during EVA: 1. Oxygen consumption, computed from the pressure drop in a high pressure bottle per unit time (with actual thermodynamic oxygen properties under high pressure and oxygen leakage taken into account). 2. Carbon dioxide production, computed from CO 2 concentration at the contaminant control cartridge and gas flow rate in the life support subsystem closed loop (nominal mode) or gas leakage in the SS open loop (emergency mode). 3. Heat removal, computed from the difference between the temperatures of coolant water or gas and its flow rate in a unit of time (with assumed humidity and wet oxygen state taken into account). Comparison of heat removal values with metabolic rates enables us to determine the thermal balance during an operative medical control of EVA at "Salyut-6", "Salyut-7" and "Mir" OSS. Complex analysis of metabolism, body temperature and heat rate supports a differential diagnosis between emotional and thermal components of stress during EVA. It gives a prognosis of human homeostasis during EVA. Available information has been acquired into an EVA data base which is an effective tool for ergonomical optimization.

  13. Wireless Propagation Characteristics for Vehicular Ad–Hoc Networks in Motorway Environments

    Directory of Open Access Journals (Sweden)

    A. Edwards

    2009-10-01

    Full Text Available This paper presents the measurements and analytical results regarding important characteristics of wireless propagation for vehicular ad–hoc networks in motorway environments, including Doppler Effect, Free Space Signal propagation, path loss and system operating margin. In this work, we employ IEEE 802.1 1b wireless cards for inter–vehicular communication to analyze large and small–scale propagation models. According to large–scale models, the maximum distance between the transmitter and receiver vehicle is 446 m using 5 dBi omni–directional antennas. Additionally, the feasible System Operating Margin (SOM of 446 m is greater than 13 dB, which is over the minimum margin recommended. Our results show that the Doppler Effect does not affect the transmission between communication partners at high speeds in small–scale models. Finally, we realize an experiment to validate the results in the worst case scenario, when the transmitter and receiver vehicle are traveling in opposing directions on a straightaway. Results show that at least 8 packets can be relayed when the transmitter and receiver antennas are mountedonautomobile dashboards.

  14. A Timing Estimation Method Based-on Skewness Analysis in Vehicular Wireless Networks.

    Science.gov (United States)

    Cui, Xuerong; Li, Juan; Wu, Chunlei; Liu, Jian-Hang

    2015-11-13

    Vehicle positioning technology has drawn more and more attention in vehicular wireless networks to reduce transportation time and traffic accidents. Nowadays, global navigation satellite systems (GNSS) are widely used in land vehicle positioning, but most of them are lack precision and reliability in situations where their signals are blocked. Positioning systems base-on short range wireless communication are another effective way that can be used in vehicle positioning or vehicle ranging. IEEE 802.11p is a new real-time short range wireless communication standard for vehicles, so a new method is proposed to estimate the time delay or ranges between vehicles based on the IEEE 802.11p standard which includes three main steps: cross-correlation between the received signal and the short preamble, summing up the correlated results in groups, and finding the maximum peak using a dynamic threshold based on the skewness analysis. With the range between each vehicle or road-side infrastructure, the position of neighboring vehicles can be estimated correctly. Simulation results were presented in the International Telecommunications Union (ITU) vehicular multipath channel, which show that the proposed method provides better precision than some well-known timing estimation techniques, especially in low signal to noise ratio (SNR) environments.

  15. A Timing Estimation Method Based-on Skewness Analysis in Vehicular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Xuerong Cui

    2015-11-01

    Full Text Available Vehicle positioning technology has drawn more and more attention in vehicular wireless networks to reduce transportation time and traffic accidents. Nowadays, global navigation satellite systems (GNSS are widely used in land vehicle positioning, but most of them are lack precision and reliability in situations where their signals are blocked. Positioning systems base-on short range wireless communication are another effective way that can be used in vehicle positioning or vehicle ranging. IEEE 802.11p is a new real-time short range wireless communication standard for vehicles, so a new method is proposed to estimate the time delay or ranges between vehicles based on the IEEE 802.11p standard which includes three main steps: cross-correlation between the received signal and the short preamble, summing up the correlated results in groups, and finding the maximum peak using a dynamic threshold based on the skewness analysis. With the range between each vehicle or road-side infrastructure, the position of neighboring vehicles can be estimated correctly. Simulation results were presented in the International Telecommunications Union (ITU vehicular multipath channel, which show that the proposed method provides better precision than some well-known timing estimation techniques, especially in low signal to noise ratio (SNR environments.

  16. Communication

    NARCIS (Netherlands)

    Sigafoos, J.; Lancioni, G.E.; O’Reilly, M.F.; Lang, R.; Singh, N.N.; Didden, H.C.M.; Green, V.A.; Marschik, P.B.

    2016-01-01

    Communication disorders are common among people with intellectual disabilities. Consequently, enhancing the communication skills of such individuals is a major intervention priority. This chapter reviews the nature and prevalence of the speech, language, and communication problems associated with

  17. An energy-efficient failure detector for vehicular cloud computing.

    Science.gov (United States)

    Liu, Jiaxi; Wu, Zhibo; Dong, Jian; Wu, Jin; Wen, Dongxin

    2018-01-01

    Failure detectors are one of the fundamental components for maintaining the high availability of vehicular cloud computing. In vehicular cloud computing, lots of RSUs are deployed along the road to improve the connectivity. Many of them are equipped with solar battery due to the unavailability or excess expense of wired electrical power. So it is important to reduce the battery consumption of RSU. However, the existing failure detection algorithms are not designed to save battery consumption RSU. To solve this problem, a new energy-efficient failure detector 2E-FD has been proposed specifically for vehicular cloud computing. 2E-FD does not only provide acceptable failure detection service, but also saves the battery consumption of RSU. Through the comparative experiments, the results show that our failure detector has better performance in terms of speed, accuracy and battery consumption.

  18. Effect of vehicular size on chain-reaction crash

    Science.gov (United States)

    Nagatani, Takashi

    2015-11-01

    We present the dynamic model of the chain-reaction crash to take account of the vehicular size. Drivers brake according to taillights of the forward vehicle. We investigate the effect of the vehicular size on the chain-reaction crash (multiple-vehicle collision) in the traffic flow controlled by taillights. In the multiple-vehicle collision, the first crash induces more collisions. We investigate how the first collision induces the chain-reaction crash numerically. We derive, analytically, the transition points and the region maps for the chain-reaction crash in the traffic flow of vehicles with finite sizes. We clarify the effect of the vehicular size on the multiple-vehicle collision.

  19. 76 FR 27355 - Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application...

    Science.gov (United States)

    2011-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Office of Justice Programs Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection... public, the ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and...

  20. 76 FR 19128 - Extension of Time for Comments on NIJ Draft Vehicular Digital Multimedia Evidence Recording...

    Science.gov (United States)

    2011-04-06

    ... Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application Guide AGENCY... Digital Multimedia Evidence Recording System Certification Program Requirements for Law Enforcement'' ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application Guide...

  1. 76 FR 13436 - NIJ Request for Comments on Draft Vehicular Digital Multimedia Evidence Recording System...

    Science.gov (United States)

    2011-03-11

    ... Digital Multimedia Evidence Recording System Selection and Application Guide AGENCY: National Institute of... Vehicular Digital Multimedia Evidence Recording System Selection and Application Guide'' The opportunity to... Office of Justice Programs NIJ Request for Comments on Draft Vehicular Digital Multimedia Evidence...

  2. Securing Communication via Transmission of Artificial Noise by Both Sides: Bipolar-Beamforming Optimization

    Directory of Open Access Journals (Sweden)

    Yongkai Zhou

    2013-01-01

    Full Text Available The paper considers the secure transmission in a wireless environment in which both the transmitter (Alice and the legitimate receiver (Bob send artificial noise (AN to interfere with the eavesdropper (Eve. Optimal design is analyzed in detail for this AN-by-both-side model to deal with Eve’s stochastic channel condition and random spatial distribution. Bipolar-beamforming is first proposed to jointly design Alice and Bob’s transmitting signals. By optimally assigning the transmitting antenna for Bob and allocating the power ratio between Alice’s information and the AN signal, maximum secrecy capacity can be achieved. Simulation is done to illustrate the process of bipolar-beamforming optimization. Results show that the AN-by-both-side model has good secrecy performance on both average and extreme conditions as Eve approaches Alice or Bob.

  3. Communications and control for electric power systems: Power flow classification for static security assessment

    Science.gov (United States)

    Niebur, D.; Germond, A.

    1993-01-01

    This report investigates the classification of power system states using an artificial neural network model, Kohonen's self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen's self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in this report, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.

  4. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Directory of Open Access Journals (Sweden)

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  5. Communicating Uncertainty about Climate Change for Application to Security Risk Management

    Science.gov (United States)

    Gulledge, J. M.

    2011-12-01

    The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk

  6. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  7. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    potentially be much larger. Is such 'output-size dependence' inherent in SFE' Surprisingly, we show that output-size dependence can be avoided in the honest-but-curious setting. In particular, using indistinguishability obfuscation (iO) and fully homomorphic encryption (FHE), we construct the first honest......-but-curious SFE protocol whose communication complexity only scales with that of the best insecure protocol for evaluating the desired function, independent of the output size. Our construction relies on a novel way of using iO via a new tool that we call a 'somewhere statistically binding (SSB) hash', and which...

  8. Estimating Vehicular Emission in Kathmandu Valley, Nepal

    Directory of Open Access Journals (Sweden)

    Krishna Prasad Ghimire

    2014-12-01

    Full Text Available The study estimate, the vehicular emission load for CO, CO2 , HCs, NOX, SO2, Dioxin/Furans, Particulate Matters (PM10, PM2.5, Black carbon and Organic Carbon by using emission factors and Global Warming Potentials (GWPs of the pollutants (CO2, NOX, BC and OC. For this purpose, data were collected through the video tape record (in 30 sites, questionnaire survey, field visit, and literatures review. The total estimated emission of Kathmandu Valley (KV was 7231053.12 ton/year. Of the total emission, CO2 emission was highest i.e., 91.01% followed by CO 5.03%, HC 0.96%, NOX 0.60%, PM10 0.18% and SO2 0.10%. Annually 529353.36 μg Toxic Equivalent (TEQ of Dioxin/Furan produced and directly disperse to the ambient environment. The total estimated PM2.5, BC and OC emission were 9649.40 ton/year, 1640.4 ton/year and 2894.82 ton/year. The total carbon equivalence of the combined emissions (CO2, NOX and BC for 100-years standard time horizon is 10579763.6 ton CO2-eq i.e., 2885390.07 ton carbon.CO2 alone will be responsible, for about 62% of the impacts for the next century from current emissions of CO2, NOX and BC. Of the total emission Heavy Duty Vehicles (HDV emits 50%, Light Duty Vehicles (LDV emits, 27%, 2-Wheelers emits 22% and 3-Wheeler (Tempo emits 1%. The total emission of all pollutants combined per vehicle together was estimated to be 5.46 ton/year which was estimated as 23.63, 10.35, 1.83 and 5.58 ton/year for HDV, LDV, 2-Wheelers and 3-Wheeler respectively. DOI: http://dx.doi.org/10.3126/ije.v3i4.11742      International Journal of EnvironmentVolume-3, Issue-4, Sep-Nov 2014Page: 133-146 

  9. An electricity consumption model for electric vehicular flow

    Science.gov (United States)

    Xiao, Hong; Huang, Hai-Jun; Tang, Tie-Qiao

    2016-09-01

    In this paper, we apply the relationships between the macro and micro variables of traffic flow to develop an electricity consumption model for electric vehicular flow. We use the proposed model to study the quantitative relationships between the electricity consumption/total power and speed/density under uniform flow, and the electricity consumptions during the evolution processes of shock, rarefaction wave and small perturbation. The numerical results indicate that the proposed model can perfectly describe the electricity consumption for electric vehicular flow, which shows that the proposed model is reasonable.

  10. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  11. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  12. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  13. Floodlight quantum key distribution: Demonstrating a framework for high-rate secure communication

    Science.gov (United States)

    Zhang, Zheshen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2017-01-01

    Floodlight quantum key distribution (FL-QKD) is a radically different QKD paradigm that can achieve gigabit-per-second secret-key rates over metropolitan area distances without multiplexing [Q. Zhuang et al., Phys. Rev. A 94, 012322 (2016), 10.1103/PhysRevA.94.012322]. It is a two-way protocol that transmits many photons per bit duration and employs a high-gain optical amplifier, neither of which can be utilized by existing QKD protocols, to mitigate channel loss. FL-QKD uses an optical bandwidth that is substantially larger than the modulation rate and performs decoding with a unique broadband homodyne receiver. Essential to FL-QKD is Alice's injection of photons from a photon-pair source—in addition to the light used for key generation—into the light she sends to Bob. This injection enables Alice and Bob to quantify Eve's intrusion and thus secure FL-QKD against collective attacks. Our proof-of-concept experiment included 10 dB propagation loss—equivalent to 50 km of low-loss fiber—and achieved a 55 Mbit/s secret-key rate (SKR) for a 100 Mbit/s modulation rate, as compared to the state-of-the-art system's 1 Mbit/s SKR for a 1 Gbit/s modulation rate [M. Lucamarini et al., Opt. Express 21, 24550 (2013), 10.1364/OE.21.024550], representing ˜500 -fold and ˜50 -fold improvements in secret-key efficiency (bits per channel use) and SKR (bits per second), respectively.

  14. Strategies for controlling pollution from vehicular emissions in Beijing

    OpenAIRE

    Wang, Qidong; He, Kebin; Li, Tiejun; Fu, Lixin

    2002-01-01

    This paper describes the severe situation of vehicular emission pollution in Beijing, and discusses the following mitigation strategies: improving fuel quality, controlling the exhaust from new vehicles, controlling the emissions from vehicles in use through, e.g., Inspection/Maintenance (I/M), renovating in-use vehicles and scrapping of old vehicles, and road infrastructure and traffic policies.

  15. Consensus-based bi-directional CACC for vehicular platooning

    NARCIS (Netherlands)

    Zegers, J.C.; Semsar-Kazerooni, E.; Ploeg, J.; Wouw, N. van de; Nijmeijer, H.

    2016-01-01

    In this paper, a novel distributed consensus control approach for vehicular platooning systems is proposed. In formalizing the underlying consensus problem, a realistic vehicle dynamics model is considered and a velocity-dependent spacing-policy between two consecutive vehicles is realized. For a

  16. Towards Opportunistic Sensed Data Dissemination in Vehicular Environments

    NARCIS (Netherlands)

    de Souza Schwartz, Ramon; van Dijk, H.W.; Scholten, Johan

    2011-01-01

    This paper proposes guidelines for the design of dissemination protocols for data sensed in vehicular environments in view of a number of potential applications. We organize the data dissemination process in three main tasks: discovery, assessment, and seizing of data exchange opportuni­ties. One

  17. Impact of Vehicular Array Position on Urban MIMO Channel Characteristics

    Directory of Open Access Journals (Sweden)

    Christopher C. Squires

    2011-01-01

    vehicle can differ significantly. Specifically, shadowing from the vehicle combined with the directionality of the side-mounted array elements affects the angular distribution and powers of the received multipath components, affecting the achievable diversity and channel capacity. This can have significant impact on system performance and should be considered when designing and analyzing vehicular-based signalling techniques.

  18. Development of an electronic vehicular traffic signal controller ...

    African Journals Online (AJOL)

    This paper presents the design, construction, and test of an electronic signal controller for urban vehicular traffic control. The design is based on a series of fixed-time signal plans for different time zones of the day and can accommodate sixty-four signal plans. Finite state machine concept was used in the design of the signal ...

  19. Comparing alertness and injury severity following motor vehicular ...

    African Journals Online (AJOL)

    Background: From casual observation of injury patterns in Motor Vehicular Accidents (MVAs), it was sometimes observed that if the victim had been more alert and reacts protectively, injury severity might be reduced. Protective response is often expected to minimize the severity of injuries. Objective: To determine the ...

  20. Output Choice of a Chaotic Jerk Circuit Used as Transmitter in Data Secure Communications

    Directory of Open Access Journals (Sweden)

    DATCU, O.

    2015-11-01

    Full Text Available Usually, when analyzing a data series, dynamical systems theory is used to reconstruct the state space of the original system. This work aims to determine which of a chaotic system's states is best suited as output when transmitting secret messages. This is the first step prior to designing an actual communication scheme. As an example, the three states of Sprott's jerk circuit are analyzed in terms of the local observability they ensure for the original dynamics when transmitted as a scalar data series. Results show that its first two states enable accurate estimation of the transmitter's dynamics at the receiving end. However, its third state generates, in some regions of the state space, a non-invertible transformation between the original state space and the one the receiver sees. This is due to the exponential nonlinearities present in this state's derivatives. Given that these nonlinearities remain inaccessible to the receiver, they are neglected in order to allow the partial reconstruction of the dynamics of the transmitter. But, since these nonlinearities are essential for the chaotic behavior, this makes the third state unusable for cryptographic purposes. This analysis may be applied to any bipolar junction transistor or diode based chaotic circuit.

  1. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  2. Vehicular traffic flow through a series of signals with cycle time generated by a logistic map

    Science.gov (United States)

    Nagatani, Takashi; Sugiyama, Naoki

    2013-02-01

    We study the dynamical behavior of vehicular traffic through a series of traffic signals. The vehicular traffic is controlled with the use of the cycle time generated by a logistic map. Each signal changes periodically with a cycle time, and the cycle time varies from signal to signal. The nonlinear dynamic model of the vehicular motion is presented by a nonlinear map including the logistic map. The vehicular traffic exhibits very complex behavior on varying both the cycle time and the logistic-map parameter a. For a>3, the arrival time shows a linear dependence on the cycle time. Also, the dependence of vehicular motion on parameter a is clarified.

  3. Communication.

    Science.gov (United States)

    Hancock, Alan

    An informal introduction to the study of communication deals with the major topics in the field. It presents basic theories of communication and language, reviews how language takes on meaning, explains the stimulus-response and Piaget theories of learning, and presents major theories dealing with communications and society. These theories include…

  4. Security system signal supervision

    Energy Technology Data Exchange (ETDEWEB)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. Communication and Networking Techniques for Traffic Safety Systems

    OpenAIRE

    Chisalita, Ioan

    2006-01-01

    Accident statistics indicate that every year a significant number of casualties and extensive property losses occur due to traffic accidents. Consequently, efforts are directed towards developing passive and active safety systems that help reduce the severity of crashes, or prevent vehicles from colliding with one another. To develop these systems, technologies such as sensor systems, computer vision and vehicular communication have been proposed. Safety vehicular communication is defined as ...

  6. Technical Rationale for Australian Computer Security Risk Analysis Guidelines

    Science.gov (United States)

    1992-06-01

    systems and products to be used for the electronic processing of National Security and/or Sensitive Material.... Computer security , Computer information security, Secure communications, Risk analysis.

  7. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad

    2012-01-01

    Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.

  8. Modeling and Application of Vehicular Cyber Physical System Based Petri Nets

    Directory of Open Access Journals (Sweden)

    Lin Chen

    2014-11-01

    Full Text Available Mobile cyber physical system (MCPS has been a hot research area, where mobile nodes can mobile, and communicate with each other. As a typical MCPS, vehicular cyber physical system (VCPS plays an important role in intelligent transportation, especially in collision avoidance. There is no, however, a formal modeling and analysis method for VCPS. In the paper, the modeling method based Petri nets (PN is presented. Furthermore, the behavior expression analysis method is also presented which can deal with arbitrary distribution timed transitions. Finally, a case is introduced to verify the effectiveness about proposed method, and the results show that VCPS can greatly reduce the reaction time of vehicles behind when emergent accident occurs and then enhance the traffic safety.

  9. Communicating.

    Science.gov (United States)

    Coursen, David

    Chapter 8 in a volume on school leadership, this chapter is a revised version of "Communications in the Open Organization." It offers suggestions from a number of authorities for administrators who want to learn how to communicate more effectively with a variety of groups within and outside the school. It begins by explaining the human…

  10. Communication.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    This theme issue on communication includes annotated listings of Web sites, CD-ROM and computer software, videos, books, and professional resources that deal with various methods of communication. Sidebars discuss mythology, photojournalism, sharing ideas on the Web, and songs of protest. Suggestions for class activities are also included. (LRW)

  11. Inner structure of vehicular ensembles and random matrix theory

    Energy Technology Data Exchange (ETDEWEB)

    Krbálek, Milan, E-mail: milan.krbalek@fjfi.cvut.cz; Hobza, Tomáš

    2016-05-06

    Highlights: • New class of random matrices (DUE) is proposed and analyzed in detail. • Approximation formula for level spacing distribution in DUE ensembles is analytically derived. • Connection between DUE and vehicular systems (analogical to a well-known link between GUE and Mexico buses) is presented. • It is shown that LS distribution of DUE matrices is the same as clearance distribution measured on expressways. - Abstract: We introduce a special class of random matrices (DUE) whose spectral statistics corresponds to statistics of microscopical quantities detected in vehicular flows. Comparing the level spacing distribution (for ordered eigenvalues in unfolded spectra of DUE matrices) with the time-clearance distribution extracted from various areas of the flux-density diagram (evaluated from original traffic data measured on Czech expressways with high occupancies) we demonstrate that the set of classical systems showing an universality associated with Random Matrix Ensembles can be extended by traffic systems.

  12. A sliding mode controller for vehicular traffic flow

    Science.gov (United States)

    Li, Yongfu; Kang, Yuhao; Yang, Bin; Peeta, Srinivas; Zhang, Li; Zheng, Taixong; Li, Yinguo

    2016-11-01

    This study proposes a sliding mode controller for vehicular traffic flow based on a car-following model to enhance the smoothness and stability of traffic flow evolution. In particular, the full velocity difference (FVD) model is used to capture the characteristics of vehicular traffic flow. The proposed sliding mode controller is designed in terms of the error between the desired space headway and the actual space headway. The stability of the controller is guaranteed using the Lyapunov technique. Numerical experiments are used to compare the performance of sliding mode control (SMC) with that of feedback control. The results illustrate the effectiveness of the proposed SMC method in terms of the distribution smoothness and stability of the space headway, velocity, and acceleration profiles. They further illustrate that the SMC strategy is superior to that of the feedback control strategy, while enabling computational efficiency that can aid in practical applications.

  13. Mobile Advertisement in Vehicular Ad-Hoc Networks

    OpenAIRE

    Dobre, Ciprian; Tudor, George Cristian

    2012-01-01

    Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of WiFi access points that dynamically disseminate data to clients running on the car's smart device. The approach can be considered an alternative to the static advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on sp...

  14. Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks

    OpenAIRE

    Aboobaker, Abdul Kalam Kunnel

    2009-01-01

    Traditionally traffic safety was addressed by traffic awareness and passive safety measures like solid chassis, seat belts, air bags etc. With the recent breakthroughs in the domain of mobile ad hoc networks, the concept of vehicular ad hoc networks (VANET) was realised. Safety messaging is the most important aspect of VANETs, where the passive safety (accident readiness) in vehicles was reinforced with the idea of active safety (accident prevention). In safety messaging vehicles will message...

  15. A Novel Routing Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raúl Aquino Santos

    2008-01-01

    Full Text Available Este trabajo examina la importancia de las redes inalámbricas ad hoc y el algoritmo de enrutamiento con inundación basada en grupos (LORA-CBF para la comunicación inter-vehicular con la finalidad de optimizar el flujo de tráfico e incrementar la seguridad en las autopistas. Se discute el algoritmo de enrutamiento LORA-CBF y se presentan los resultados de simulaciones realizadas en OPNET de una autopista con alta movilidad vehicular. Primero, el modelo de simulación propuesto se valida a pequeña escala con resultados experimentales. Posteriormente, se emplean simulaciones de nuestro modelo comparándolos con Ad Hoc On-Demand Distance Vector (AODV y Dynamic Source Routing (DSR. Finalmente, se emplea un modelo de tráfico microscópico desarrollado en OPNET para simular la movilidad de 250 vehículos en una autopista y se aplica el algoritmo de enrutamiento LORA-CBF en un escenario vehicular.

  16. A Novel Geo-Broadcast Algorithm for V2V Communications over WSN

    OpenAIRE

    José J. Anaya; Edgar Talavera; Felipe Jiménez; Nuria Gómez; Naranjo, José E.

    2014-01-01

    The key for enabling the next generation of advanced driver assistance systems (ADAS), the cooperative systems, is the availability of vehicular communication technologies, whose mandatory installation in cars is foreseen in the next few years. The definition of the communications is in the final step of development, with great efforts on standardization and some field operational tests of network devices and applications. However, some inter-vehicular communications issues are not sufficient...

  17. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — For the proposed CoNNeCT experiment, Innoflight and John Hopkins University Applied Physics Laboratory (JHU/APL) have formed a significant complimentary union with...

  18. Plant-Damage Assessment Technique for Evaluating Military Vehicular Impacts to Vegetation in the Mojave Desert

    Energy Technology Data Exchange (ETDEWEB)

    D. J. Hansen; W. K. Ostler

    2001-09-01

    A new plant damage assessment technique was developed by plant ecologists from Bechtel Nevada at the U.S. Department of Energy's National Security Administration Nevada Operations Office and funded by the Strategic Environmental Research and Development Program Project CS-1131 in cooperation with the U.S. Army's National Training Center (NTC) at Fort Irwin, California. The technique establishes linear transects the width of vehicle tracts from evidence of vehicle tracks in the soil (usually during a prior training rotation period of 30 days or since the last rain or wind storm), and measures vegetation within the tracks to determine the area of plant parts being run over, the percent of the impacted parts damaged, and the percent of impacted parts expected to recover. It documents prior-damage classes based on estimated of damage that plants have apparently experienced previously (as assessed from field indicators of damage such as plant shape and height). The technique was used to evaluate different vehicle types (rubber-tire wheels vs. tracks) in six area at the NTC with different soils and training intensity levels. The technique provides tabular data that can be sorted and queried to show a variety of trends related to military vehicular impacts. The technique also appears suitable for assessing other non-military off-road traffic impacts. Findings report: (1) differences in plant sensitivity of different vehicular impacts, (2) plant cover and density by species and training area, (3) the degree to which wheels have less impact than tracks, and (4) the mean percent survival is inversely proportional to the degree of prior damage received by the vegetation (i.e., plants previously impacted have lower survival than plants not previously impacted).

  19. Communications

    Indian Academy of Sciences (India)

    Popular mediums : Paper postal service, newspapers. Air (Wireless) person to person communication, mobile phones, satellite systems. Copper Wire ( Land - line) POTS based telephone system; Other mediums optical fiber, water etc.

  20. Communications

    OpenAIRE

    anonymous

    1982-01-01

    Communications are read for interest in issues that have importance for all who practice and use management science. They are not refereed for technical correctness, as are articles and Notes that appear in Management Science. The reader is therefore cautioned that the publication of any Communication implies neither scientific standing nor acceptance per se on the part of either Management Science or TIMS. Centers Within Universities: Management and Evaluation by James G. Taaffe, On a Common...

  1. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    André Weimerskirch

    2007-06-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  2. CHANGING PERSPECTIVES OF MOBILE INFORMATION COMMUNICATION TECHNOLOGIES TOWARDS CUSTOMIZED AND SECURED SERVICES THROUGH 5G & 6G

    OpenAIRE

    Krishna Prasad, K; Dr. P. S. Aithal

    2016-01-01

    The developments in Information Communication Technology (ICT) made the interpersonal and intra-computer communications ideal in terms of distance and time and made online-ubiquitous communication a reality.  Advents in electronic communication technology with an affinity of enhancing the bandwidth and speed through wireless channel supported in development of 3G technologies and further advents in data mining, online analytical techniques further supported in customization of services to the...

  3. The influence of vehicular obstacles on longitudinal ventilation control in tunnel fires

    DEFF Research Database (Denmark)

    Alva, Wilson Ulises Rojas; Jomaas, Grunde; Dederichs, Anne

    2017-01-01

    The effect of the vehicular blockage in a tunnel under longitudinal ventilation smoke control was systematically studied using a small-scale tunnel (1:30 of a standard tunnel section) with a helium-air mixture as the buoyant plume. The experimental results showed excellent agreement with full......-scale data and reference correlations from former studies. When there are vehicular obstacles in the tunnel, the critical velocity decreased as a function of the blockage ratio. Notwithstanding, it was found that the relative size of the vehicular obstacle and the relative location of the fire source can...... of the vehicular blockage on tunnel fire dynamics....

  4. A hierarchical detection method in external communication for self-driving vehicles based on TDMA

    Science.gov (United States)

    Al-ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302

  5. A hierarchical detection method in external communication for self-driving vehicles based on TDMA.

    Science.gov (United States)

    Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

  6. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network

    Science.gov (United States)

    Al-Mayouf, Yusor Rafid Bahar; Ismail, Mahamod; Abdullah, Nor Fadzilah; Wahab, Ainuddin Wahid Abdul; Mahdi, Omar Adil; Khan, Suleman; Choo, Kim-Kwang Raymond

    2016-01-01

    Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destination node via multi-hop routing techniques. An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). The proposed algorithm can adapt to significant changes that may occur in the urban vehicular environment. This algorithm works by selecting an optimal route on the basis of hop count and link duration for delivering data from source to destination, thereby satisfying various quality of service considerations. The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. Simulation results reveal that the proposed ESRA-MD algorithm shows remarkable improvement in terms of delivery ratio, delivery delay, and communication overhead. PMID:27855165

  8. Zaštićena komunikacija putem infrastrukture sa javnim ključevima / Secure communication via public key infrastructure

    Directory of Open Access Journals (Sweden)

    Đuro Alfirević

    2007-01-01

    Full Text Available Jedan tok informacija u okviru računarskih sistema ostvaruje se slanjem elektronske pošte. Međutim, da bi se ispunili zahtevi za kvalitativnost informacije koju ta pošta prenosi, neophodno je da računarska mreža ispunjava osnovna četiri bezbednosna servisa: zaštitu tajnosti, integritet podataka autentikaciju i neporecivost. Ovaj rad predstavlja jedno od mogućih rešenja zaštićene komunikacije, primenom zaštićenog e-mail klijenta, sa prednostima koje donosi PKCS standard. / One of the information flows in a computer communication domain is accomplished by sending an e-mail, but in order to accomplish demands for information qualitativity that the e-mail contains, it's necessary for a computer network to provide the major four security services confidentiality, data integrity, authentication and non-repudiation. This work represents one of the possible solutions of secured communication applying a secured e-mail client with advantages that PKCS standard brings.

  9. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  10. Reasons for Picture Archiving and Communication System (PACS data security breaches: Intentional versus non-intentional breaches

    Directory of Open Access Journals (Sweden)

    Tintswalo Brenda Mahlaola

    2016-12-01

    Conclusion: Our study supports previous findings that, in the absence of guidelines, most security breaches were non-intentional acts committed due to ignorance. Of concern are incidents in which sensitive information was intentionally shared via social media.

  11. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    National Research Council Canada - National Science Library

    Sumithra Alagarsamy; S P Rajagopalan

    2017-01-01

    ... authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF...

  12. EcoMark: Evaluating Models of Vehicular Environmental Impact

    DEFF Research Database (Denmark)

    Guo, Chenjuan; Ma, Mike; Yang, Bin

    2012-01-01

    the vehicle travels in. We develop an evaluation framework, called EcoMark, for such environmental impact models. In addition, we survey all eleven state-of-the-art impact models known to us. To gain insight into the capabilities of the models and to understand the effectiveness of the EcoMark, we apply......The reduction of greenhouse gas (GHG) emissions from transporta- tion is essential for achieving politically agreed upon emissions re- duction targets that aim to combat global climate change. So-called eco-routing and eco-driving are able to substantially reduce GHG emissions caused by vehicular...

  13. Energy Efficient Wireless Vehicular-Guided Actuator Network

    KAUST Repository

    Boudellioua, Imene

    2013-06-09

    In this paper, we present an energy-efficient vehicular guided system for environmental disaster management using wireless sensor/actuator networks. Sensor nodes within clusters are controlled by a master node that is dynamically selected. Actuators support mobility for every sensor node in the area of interest. The system maintains energy efficiency using statistical, correlation, and confidence for determining actuator actions and implements an adaptive energy scheme to prolong the system lifespan. Experimental results show that the system is capable of saving up to 2.7Watt for every 28KByte of data exchanged. We also show that actuator actions are correct with a 90% confidence.

  14. Inner structure of vehicular ensembles and random matrix theory

    Science.gov (United States)

    Krbálek, Milan; Hobza, Tomáš

    2016-05-01

    We introduce a special class of random matrices (DUE) whose spectral statistics corresponds to statistics of microscopical quantities detected in vehicular flows. Comparing the level spacing distribution (for ordered eigenvalues in unfolded spectra of DUE matrices) with the time-clearance distribution extracted from various areas of the flux-density diagram (evaluated from original traffic data measured on Czech expressways with high occupancies) we demonstrate that the set of classical systems showing an universality associated with Random Matrix Ensembles can be extended by traffic systems.

  15. Vehicular headways on signalized intersections: theory, models, and reality

    Science.gov (United States)

    Krbálek, Milan; Šleis, Jiří

    2015-01-01

    We discuss statistical properties of vehicular headways measured on signalized crossroads. On the basis of mathematical approaches, we formulate theoretical and empirically inspired criteria for the acceptability of theoretical headway distributions. Sequentially, the multifarious families of statistical distributions (commonly used to fit real-road headway statistics) are confronted with these criteria, and with original empirical time clearances gauged among neighboring vehicles leaving signal-controlled crossroads after a green signal appears. Using three different numerical schemes, we demonstrate that an arrangement of vehicles on an intersection is a consequence of the general stochastic nature of queueing systems, rather than a consequence of traffic rules, driver estimation processes, or decision-making procedures.

  16. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... or write the Deputy Manager, National Communications System, Department of Homeland Security, 245...

  17. SPECIAL AND MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS AS VITAL PART OF THE CRITICAL INFRASTRUCTURES IN ROMANIA. SECURING THEIR PHYSICAL AND INFORMATIONAL PROTECTION

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2012-11-01

    Full Text Available The article presents several arguments on the need to study the critical infrastructure in Romania including various systems (networks and special military communications. It emphasizes the role and place of such systems and networks to provide national defense and security and the risks and vulnerabilities faced by these infrastructures, and some necessary measures to be taken for the physical and informational protection in the case of hostile military actions, natural disasters or other negative phenomena. Finally some conclusions and proposals are formulated.

  18. 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities 2016

    CERN Document Server

    Qayyum, Amir; Saad, Mohamad

    2017-01-01

    This book presents selected articles from the Second International Workshop on Vehicular Adhoc Networks for Smart Cities, 2016 (IWVSC’2016). In order to promote further research activities and challenges, it highlights recent developments in vehicular networking technologies and their role in future smart cities.

  19. 76 FR 52350 - Vehicular Digital Multimedia Evidence Recording System (VDMERS) Standard, Certification Program...

    Science.gov (United States)

    2011-08-22

    ... of Justice Programs Vehicular Digital Multimedia Evidence Recording System (VDMERS) Standard...) will make available to the general public three draft documents related to Vehicular Digital Multimedia Evidence Recording Systems (VDMERSs) used by law enforcement agencies: 1. Draft VDMERS Standard for Law...

  20. 75 FR 78269 - Vehicular Digital Multimedia Evidence Recording System (VDMERS) Standard for Law Enforcement

    Science.gov (United States)

    2010-12-15

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Office of Justice Programs Vehicular Digital Multimedia Evidence Recording System (VDMERS) Standard for Law... the general public the draft ``Vehicular Digital Multimedia Evidence Recording System Standard for Law...

  1. 47 CFR 15.515 - Technical requirements for vehicular radar systems.

    Science.gov (United States)

    2010-10-01

    ... DEVICES Ultra-Wideband Operation § 15.515 Technical requirements for vehicular radar systems. (a) Operation under the provisions of this section is limited to UWB field disturbance sensors mounted in... 47 Telecommunication 1 2010-10-01 2010-10-01 false Technical requirements for vehicular radar...

  2. “You Can’t Argue with Security.” The Communication and Practice of Everyday Safeguarding in the Society of Security

    Directory of Open Access Journals (Sweden)

    Katharina Eisch-Angus

    2011-09-01

    Full Text Available Through ethnographic encounters and interviews in English middle-class neighbourhoods and institutions,such as schools or the police, Katharina Eisch-Angus traces the concepts of ‘safety’ and‘security’ concentrating particularly on their associations with the idea and practice of ‘community’and the ways in which they are disseminated within everyday realities. Emerging systems of governmentalcontrol gain an irrefutable persuasiveness by coupling the necessity of safeguarding privatespheres with public security demands and by referring to a mentality of personal civic responsibilityand charity. In everyday narratives and on-going public debates – from issues of health and safety,or neighbourhood crime, to the threat of paedophiles – suggestive fear and everyday experience,reason and absurdity interlock, whilst also opening up space for resistance and alternative decisions.

  3. Cross-Network Information Dissemination in Vehicular Ad hoc Networks (VANETs: Experimental Results from a Smartphone-Based Testbed

    Directory of Open Access Journals (Sweden)

    Gianluigi Ferrari

    2013-08-01

    Full Text Available In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs. The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD, leverages on the spontaneous formation of local WiFi (IEEE 802.11b VANETs, with direct connections between neighboring vehicles, in order to disseminate, very quickly and inexpensively, traffic alerts received from the cellular network. The proposed communication architecture has been implemented on Android smartphones. The obtained experimental results show that an effective cross-network information dissemination service can entirely rely on smartphone-based communications. This paves the way to future Internet architectures, where vehicles will play a key role as information destinations and sources.

  4. An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

    Directory of Open Access Journals (Sweden)

    Gianmarco Baldini

    2017-01-01

    Full Text Available In Vehicular Ad Hoc Networks (VANETs used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V and Vehicle to Infrastructure (V2I communications implemented with the Dedicated Short Range Communications (DSRC standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately identify and fingerprint wireless devices through their radio frequency (RF emissions has been demonstrated in the literature. This capability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper investigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this paper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading.

  5. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  6. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Science.gov (United States)

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  7. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  8. Security challenges for cooperative and interconnected mobility systems

    NARCIS (Netherlands)

    Bijlsma, T.; Kievit, S. de; Sluis, H.J.D. van de; Nunen, E. van; Passchier, I.; Luiijf, H.A.M.

    2013-01-01

    Software is becoming an important part of the innovation for vehicles. In addition, the systems in vehicles become interconnected and also get external connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent

  9. COMMUNICATIONS

    CERN Multimedia

    L. Taylor and D. Barney

    2010-01-01

    CMS Centres, Outreach and the 7 TeV Media Event The new CMS Communications group is now established and is addressing three areas that are critical to CMS as it enters the physics operations phase: - Communications Infrastructure, including almost 50 CMS Centres Worldwide, videoconferencing systems, and CERN meeting rooms - Information systems, including the internal and external Web sites as well as the document preparation and management systems - Outreach and Education activities, including working with print, radio and TV media, visits to CMS, and exhibitions. The group has been active in many areas, with the highest priority being accorded to needs of CMS operations and preparations for the major media event planned for 7 TeV collisions. Unfortunately the CMS Centre@CERN suffered a major setback when, on 21st December, a cooling water pipe froze and burst on the floor above the CMS Centre main room. Water poured through the ceiling, flooding the floor and soaking some of the consoles, before e...

  10. COMMUNICATIONS

    CERN Multimedia

    A. Petrilli

    2013-01-01

    The organisation of the Open Days at the end of September was the single biggest effort of the CMS Communications Group this year. We would like to thank all volunteers for their hard work to show our Point 5 facilities and explain science and technology to the general public. During two days more than 5,000 people visited the CMS detector underground and profited from the surface activities, which included an exhibition on CMS, a workshop on superconductivity, and an activity for our younger visitors involving wooden Kapla blocks. The Communications Group took advantage of the preparations to produce new CMS posters that can be reused at other venues. Event display images have been produced not just for this occasion but also for other exhibits, education purposes, publications etc. During the Open Days, Gilles Jobin, 2012 winner of CERN Collide@CERN prize, performed his Quantum show in Point 5, with the light installation of German artist Julius von Bismarck. Image 3: CERN Open Days at CMS wel...

  11. Compact mobile-reader system for two-way wireless communication, tracking and status monitoring for transport safety and security

    Science.gov (United States)

    Tsai, Han-Chung; Liu, Yung Y.; Lee, Hok L.; Craig, Brian; Byrne, Kevin; Mittal, Ketan; Scherer, Justin C.

    2016-12-06

    A system for monitoring a plurality radio frequency identification tags is described. The system uses at least one set of radio frequency identification tags. Each tag is attached to a container and includes several sensors for detecting physical conditions of said container. The system includes at least one autonomous intermediate reader in wireless communication with the frequency identification tags. The intermediate reader includes external wireless communication system, intermediate reader logic controller, and a self-contained rechargeable power supply. The system uses a central status reporting system in communication the intermediate reader.

  12. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  13. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available Recent advances in technologies has led to the use of wireless communication networks for the transmission of information. However, the broadcast nature of wireless channels has made it vulnerable to attacks. In this paper, we present work...

  14. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    Science.gov (United States)

    2006-02-24

    Information Technology Management Department of Defense Office of Inspector General February 24, 2006 AccountabilityIntegrityQuality Select Controls...00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management : Select Controls for the Information Security of the Ground-Based

  15. Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad

    Science.gov (United States)

    Liu, Zhihao; Chen, Hanwu; Liu, Wenjie

    2016-10-01

    A new attack strategy, the so-called intercept-selectively-measure-resend attack is put forward. It shows that there are some security issues in the controlled quantum secure direct communication (CQSDC) and authentication protocol based on five-particle cluster states and quantum one-time pad. Firstly, an eavesdropper (Eve) can use this attack to eavesdrop on 0.656 bit of every bit of the identity string of the receiver and 1.406 bits of every couple of the corresponding bits of the secret message without being detected. Also, she can eavesdrop on 0.311 bit of every bit of the identity string of the controller. Secondly, the receiver can also take this attack to obtain 1.311 bits of every couple of the corresponding bits of the secret message without the permission of the controller, which is not allowed in the CQSDC protocols. In fact, there is another security issue in this protocol, that is, one half of the information about the secret is leaked out unconsciously. In addition, an alternative attack strategy which is called as the selective-CNOT-operation attack strategy to attack this protocol is discussed.

  16. Mathematical Analysis of EDCA's Performance on the Control Channel of an IEEE 802.11p WAVE Vehicular Network

    Directory of Open Access Journals (Sweden)

    Hussein T. Mouftah

    2010-01-01

    Full Text Available Wireless networks for vehicular environments are gaining increasing importance due to their ability to provide a means for stations on the roadside and radio units on board of vehicles to communicate and share safety-related information, thus reducing the probability of accidents and increasing the efficiency of the transportation system. With this goal in mind, the IEEE is currently developing the Wireless Access in Vehicular Environments (WAVE IEEE 802.11p standard. WAVE devices use the IEEE 802.11's Enhanced Distributed Channel Access (EDCA MAC protocol to compete for the transmission medium. This work proposes an analytical tool to evaluate the performance of EDCA under the specific conditions of the so-called control channel (CCH of a WAVE environment, including the particular EDCA parameter values and the fact that all safety-critical data frames are broadcasted. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions. The main analysis is performed assuming that the CCH works continuously, and then an explanation is given as to the considerations that are needed to account for the fact that activity on the CCH is intermittent.

  17. BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Peng Li

    2014-11-01

    Full Text Available In vehicular ad hoc networks, roadside units (RSUs placement has been proposed to improve the the overall network performance in many ITS applications. This paper addresses the budget constrained and delay-bounded placement problem (BCDP for roadside units in vehicular ad hoc networks. There are two types of RSUs: cable connected RSU (c-RSU and wireless RSU (w-RSU. c-RSUs are interconnected through wired lines, and they form the backbone of VANETs, while w-RSUs connect to other RSUs through wireless communication and serve as an economical extension of the coverage of c-RSUs. The delay-bounded coverage range and deployment cost of these two cases are totally different. We are given a budget constraint and a delay bound, the problem is how to find the optimal candidate sites with the maximal delay-bounded coverage to place RSUs such that a message from any c-RSU in the region can be disseminated to the more vehicles within the given budget constraint and delay bound. We first prove that the BCDP problem is NP-hard. Then we propose several algorithms to solve the BCDP problem. Simulation results show the heuristic algorithms can significantly improve the coverage range and reduce the total deployment cost, compared with other heuristic methods.

  18. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    Science.gov (United States)

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-06-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme.

  19. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2016-06-01

    Full Text Available In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme.

  20. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  1. Impact of hydrogen insertion on vehicular natural gas

    Energy Technology Data Exchange (ETDEWEB)

    Strangueto, Karina Maretti; Silva, Ennio Peres da [Universidade Estadual de Campinas (UNICAMP), SP (Brazil). Fac. of Mechanical Engineering. Energy Dept.], Email: karinakms@fem.unicamp.br

    2010-07-01

    This article aims to analyze the possibility of insertion of hydrogen in the vehicular natural gas or even the insertion of the hydrogen in the compressed natural gas used in Brazil. For the production of this hydrogen, the spilled turbinable energy from Itaipu would be harnessed. The calculation of production can be extended to other power plants which are close to the natural gas pipelines, where the hydrogen would be introduced. Then, it was analyzed the consumption of natural gas in vehicles in Brazil, the regulation of transportation, the sales of compressed natural gas to fuelling station, the specifications that the piped gas should follow to be sold, and how much hydrogen could be accepted in the mix. (author)

  2. Health benefit modelling and optimization of vehicular pollution control strategies

    Science.gov (United States)

    Sonawane, Nayan V.; Patil, Rashmi S.; Sethi, Virendra

    2012-12-01

    This study asserts that the evaluation of pollution reduction strategies should be approached on the basis of health benefits. The framework presented could be used for decision making on the basis of cost effectiveness when the strategies are applied concurrently. Several vehicular pollution control strategies have been proposed in literature for effective management of urban air pollution. The effectiveness of these strategies has been mostly studied as a one at a time approach on the basis of change in pollution concentration. The adequacy and practicality of such an approach is studied in the present work. Also, the assessment of respective benefits of these strategies has been carried out when they are implemented simultaneously. An integrated model has been developed which can be used as a tool for optimal prioritization of various pollution management strategies. The model estimates health benefits associated with specific control strategies. ISC-AERMOD View has been used to provide the cause-effect relation between control options and change in ambient air quality. BenMAP, developed by U.S. EPA, has been applied for estimation of health and economic benefits associated with various management strategies. Valuation of health benefits has been done for impact indicators of premature mortality, hospital admissions and respiratory syndrome. An optimization model has been developed to maximize overall social benefits with determination of optimized percentage implementations for multiple strategies. The model has been applied for sub-urban region of Mumbai city for vehicular sector. Several control scenarios have been considered like revised emission standards, electric, CNG, LPG and hybrid vehicles. Reduction in concentration and resultant health benefits for the pollutants CO, NOx and particulate matter are estimated for different control scenarios. Finally, an optimization model has been applied to determine optimized percentage implementation of specific

  3. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  4. Impact of Vehicular Networks on Emergency Medical Services in Urban Areas

    Directory of Open Access Journals (Sweden)

    Chun-Liang Lee

    2014-10-01

    Full Text Available The speed with which emergency personnel can provide emergency treatment is crucial to reducing death and disability among acute and critically ill patients. Unfortunately, the rapid development of cities and increased numbers of vehicles are preventing emergency vehicles from easily reaching locations where they are needed. A significant number of researchers are experimenting with vehicular networks to address this issue, but in most studies the focus has been on communication technologies and protocols, with few efforts to assess how network applications actually support emergency medical care. Our motivation was to search the literature for suggested methods for assisting emergency vehicles, and to use simulations to evaluate them. Our results and evidence-based studies were cross-referenced to assess each method in terms of cumulative survival ratio (CSR gains for acute and critically ill patients. Simulation results indicate that traffic light preemption resulted in significant CSR increases of between 32.4% and 90.2%. Route guidance was found to increase CSRs from 14.1% to 57.8%, while path clearing increased CSRs by 15.5% or less. It is our hope that this data will support the efforts of emergency medical technicians, traffic managers, and policy makers.

  5. Impact of vehicular networks on emergency medical services in urban areas.

    Science.gov (United States)

    Lee, Chun-Liang; Huang, Chung-Yuan; Hsiao, Tzu-Chien; Wu, Chun-Yen; Chen, Yaw-Chung; Wang, I-Cheng

    2014-10-31

    The speed with which emergency personnel can provide emergency treatment is crucial to reducing death and disability among acute and critically ill patients. Unfortunately, the rapid development of cities and increased numbers of vehicles are preventing emergency vehicles from easily reaching locations where they are needed. A significant number of researchers are experimenting with vehicular networks to address this issue, but in most studies the focus has been on communication technologies and protocols, with few efforts to assess how network applications actually support emergency medical care. Our motivation was to search the literature for suggested methods for assisting emergency vehicles, and to use simulations to evaluate them. Our results and evidence-based studies were cross-referenced to assess each method in terms of cumulative survival ratio (CSR) gains for acute and critically ill patients. Simulation results indicate that traffic light preemption resulted in significant CSR increases of between 32.4% and 90.2%. Route guidance was found to increase CSRs from 14.1% to 57.8%, while path clearing increased CSRs by 15.5% or less. It is our hope that this data will support the efforts of emergency medical technicians, traffic managers, and policy makers.

  6. Fountain-code Aided File Transfer in Vehicular Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    YOUSEFI, S.

    2013-11-01

    Full Text Available We propose a mechanism for facilitating file transferring in Vehicular Delay Tolerant Networks. The proposed architecture includes using Fountain coding in the application layer, UDP in the transport layer and a proposed DTN routing algorithm in the network layer. It is assumed that files are coded based on a sample of Fountain codes which does not need in-order reception of packets. As a result, there is no need of using close-loop reliable protocols such as TCP, hence suffering from their different overheads; as a result, UDP can be used in the transport layer. In the network layer, we propose a novel DTN routing algorithm based on AODV and Store-Carry and Forward policy. This algorithm (named as AODV-DTN uses a cross layer interaction between the network and the application layer. Results of extensive simulations study for highway scenarios show that the proposed architecture leads to a better performance in terms of file delivery ratio and byte throughput when compared with FOUNTAIN and classic FTP scenarios. Furthermore, the negative effect of increasing file size is mitigated in comparison to other alternatives. It is also shown that for delay tolerant and long-distanced inter-RSU communications the proposed architecture behaves sufficiently well.

  7. Using Hybrid Angle/Distance Information for Distributed Topology Control in Vehicular Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chao-Chi Huang

    2014-10-01

    Full Text Available In a vehicular sensor network (VSN, the key design issue is how to organize vehicles effectively, such that the local network topology can be stabilized quickly. In this work, each vehicle with on-board sensors can be considered as a local controller associated with a group of communication members. In order to balance the load among the nodes and govern the local topology change, a group formation scheme using localized criteria is implemented. The proposed distributed topology control method focuses on reducing the rate of group member change and avoiding the unnecessary information exchange. Two major phases are sequentially applied to choose the group members of each vehicle using hybrid angle/distance information. The operation of Phase I is based on the concept of the cone-based method, which can select the desired vehicles quickly. Afterwards, the proposed time-slot method is further applied to stabilize the network topology. Given the network structure in Phase I, a routing scheme is presented in Phase II. The network behaviors are explored through simulation and analysis in a variety of scenarios. The results show that the proposed mechanism is a scalable and effective control framework for VSNs.

  8. Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough

    NARCIS (Netherlands)

    Wiedersheim, B.; Ma, Zhendong; Kargl, Frank; Papadimitratos, P.

    Inter-vehicle communication (IVC) systems disclose rich location information about vehicles. State-of-the-art security architectures are aware of the problem and provide privacy enhancing mechanisms, notably pseudonymous authentication. However, the granularity and the amount of location information

  9. Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks

    KAUST Repository

    Atat, Rachad

    2014-05-01

    Delay-sensitive content distribution with peer-to-peer (P2P) cooperation in public safety vehicular networks is investigated. Two cooperative schemes are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range (LR) communications with the base station (BS) and IEEE 802.11p is considered for inter-vehicle collaboration on the short range (SR). The first scheme is shown to outperform non-cooperative unicasting and multicasting, while the second scheme outperforms non-cooperative unicasting beyond a specific number of cooperating vehicles, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2014 Elsevier B.V. All rights reserved.

  10. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  11. Low Emissions and Delay Optimization for an Isolated Signalized Intersection Based on Vehicular Trajectories.

    Directory of Open Access Journals (Sweden)

    Ciyun Lin

    Full Text Available A traditional traffic signal control system is established based on vehicular delay, queue length, saturation and other indicators. However, due to the increasing severity of urban environmental pollution issues and the development of a resource-saving and environmentally friendly social philosophy, the development of low-carbon and energy-efficient urban transport is required. This paper first defines vehicular trajectories and the calculation of vehicular emissions based on VSP. Next, a regression analysis method is used to quantify the relationship between vehicular emissions and delay, and a traffic signal control model is established to reduce emissions and delay using the enumeration method combined with saturation constraints. Finally, one typical intersection of Changchun is selected to verify the model proposed in this paper; its performance efficiency is also compared using simulations in VISSIM. The results of this study show that the proposed model can significantly reduce vehicle delay and traffic emissions simultaneously.

  12. Diseno de un sensor de flujo vehicular basado en lazo inductivo

    National Research Council Canada - National Science Library

    Alpizar Arteaga, Ernesto; del Risco Sanchez, Arnaldo

    2012-01-01

    Se presenta el diseno de un sensor de Flujo Vehicular de Lazo Inductivo en su variante de deteccion basada en frecuencimetro, se describe el proceso de diseno fundamentado en la explicacion de cada...

  13. A Portable Computer Security Workshop

    Science.gov (United States)

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  14. A Group Vehicular Mobility Model for Routing Protocol Analysis in Mobile Ad Hoc Network

    OpenAIRE

    Kulkarni, Shrirang Ambaji; Rao, G Raghavendra

    2010-01-01

    Performance of routing protocols in mobile ad-hoc networks is greatly affected by the dynamic nature of nodes, route failures, wireless channels with variable bandwidth and scalability issues. A mobility model imitates the real world movement of mobile nodes and is central component to simulation based studies. In this paper we consider mobility nodes which mimic the vehicular motion of nodes like Manhattan mobility model and City Section mobility model. We also propose a new Group Vehicular ...

  15. Design of a privacy-aware routing protocol for vehicular ad hoc networks

    OpenAIRE

    Daunou, Adrien

    2012-01-01

    Desarrollo de un protocolo de encaminamiento con privacidad basado en CROWD para redes vehiculares. English: the continued growth of the vehicular fleet has opened new business opportunities and new needs of road safety. The constant mobility of individuals and the necessity of staying connected makes studying the possibilities of connectivity and transmission of information between vehicles one of the main objectives of the cars manufacturers. The social costs that accompany this developm...

  16. Questions and Answers for Ken Thomas' "Intra-Extra Vehicular Activity Russian and Gemini Spacesuits" Presentation

    Science.gov (United States)

    Thomas, Kenneth S.

    2016-01-01

    Kenneth Thomas will discuss the Intra-Extra Vehicular Activity Russian & Gemini spacesuits. While the United States and Russia adapted to existing launch- and reentry-type suits to allow the first human ventures into the vacuum of space, there were differences in execution and capabilities. Mr. Thomas will discuss the advantages and disadvantages of this approach compared to exclusively intravehicular or extra-vehicular suit systems.

  17. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    Science.gov (United States)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  18. Vehicular emissions of organic particulate matter in Sao Paulo, Brazil

    Science.gov (United States)

    Oyama, B. S.; Andrade, M. F.; Herckes, P.; Dusek, U.; Röckmann, T.; Holzinger, R.

    2015-12-01

    Vehicular emissions have a strong impact on air pollution in big cities. Many factors affect these emissions: type of vehicle, type of fuel, cruising velocity, and brake use. This study focused on emissions of organic compounds by Light (LDV) and Heavy (HDV) duty vehicle exhaust. The study was performed in the city of Sao Paulo, Brazil, where vehicles run on different fuels: gasoline with 25 % ethanol (called gasohol), hydrated ethanol, and diesel (with 5 % of biodiesel). The vehicular emissions are an important source of pollutants and the principal contribution to fine particulate matter (smaller than 2.5 μm, PM2.5) in Sao Paulo. The experiments were performed in two tunnels: Janio Quadros (TJQ) where 99 % of the vehicles are LDV, and Rodoanel Mario Covas (TRA) where up to 30 % of the fleet was HDV. The PM2.5 samples were collected on quartz filters in May and July 2011 at TJQ and TRA, respectively, using two samplers operating in parallel. The samples were analyzed by Thermal-Desorption Proton-Transfer-Reaction Mass-Spectrometry (TD-PTR-MS), and by Thermal-Optical Transmittance (TOT). The organic aerosol (OA) desorbed at TD-PTR-MS represented around 30 % of the OA estimated by the TOT method, mainly due to the different desorption temperatures, with a maximum of 870 and 350 °C for TOT and TD-PTR-MS, respectively. Average emission factors (EF) organic aerosol (OA) and organic carbon (OC) were calculated for HDV and LDV fleet. We found that HDV emitted more OA and OC than LDV, and that OC emissions represented 36 and 43 % of total PM2.5 emissions from LDV and HDV, respectively. More than 700 ions were identified by TD-PTR-MS and the EF profiles obtained from HDV and LDV exhibited distinct features. Nitrogen-containing compounds measured in the desorbed material up to 350 °C contributed around 20 % to the EF values for both types of vehicles, possibly associated with incomplete fuel burning. Additionally, 70 % of the organic compounds measured from the aerosol

  19. Study of the Platooning Fuel Efficiency under ETSI ITS-G5 Communications

    NARCIS (Netherlands)

    Lyamin, N.; Deng, Q.; Vinel, A

    2016-01-01

    In this paper we evaluate the performance of platoon enabled by contemporary ITS-G5 vehicular communications through the number of simulation experiments. We assess platooning fuel consumption performance under two communication setups and estimate the potential influence of the communication system

  20. Three methods for estimating a range of vehicular interactions

    Science.gov (United States)

    Krbálek, Milan; Apeltauer, Jiří; Apeltauer, Tomáš; Szabová, Zuzana

    2018-02-01

    We present three different approaches how to estimate the number of preceding cars influencing a decision-making procedure of a given driver moving in saturated traffic flows. The first method is based on correlation analysis, the second one evaluates (quantitatively) deviations from the main assumption in the convolution theorem for probability, and the third one operates with advanced instruments of the theory of counting processes (statistical rigidity). We demonstrate that universally-accepted premise on short-ranged traffic interactions may not be correct. All methods introduced have revealed that minimum number of actively-followed vehicles is two. It supports an actual idea that vehicular interactions are, in fact, middle-ranged. Furthermore, consistency between the estimations used is surprisingly credible. In all cases we have found that the interaction range (the number of actively-followed vehicles) drops with traffic density. Whereas drivers moving in congested regimes with lower density (around 30 vehicles per kilometer) react on four or five neighbors, drivers moving in high-density flows respond to two predecessors only.

  1. PERFORMANCE COMPARISON OF POSITION-BASED ROUTING PROTOCOLS IN VEHICLE-TOVEHICLE (V2V) COMMUNICATION

    OpenAIRE

    SANJOY DAS; RAM SHRINGAR RAW,

    2011-01-01

    Vehicular Ad hoc Networks (VANETs) is the new wireless networking concept of the wireless ad hoc networks in the research community. Vehicle-to-Vehicle (V2V) communication plays a significant role in providing a high level of safety and convenience to drivers and passengers. Routing in VANET is a major challenge and research area. Position based routing protocol has been identified to be suitable for VANETs because of frequently changed network topology and highly dynamic nature of vehicular ...

  2. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  3. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  4. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  5. The Nanchang Communication about the potential for implementation of conservation practices for climate change mitigation and adaptation to achieve food security in the 21st century

    Directory of Open Access Journals (Sweden)

    Jorge A. Delgado

    2016-06-01

    adaptation to climate change to achieve food security in the 21st century. These papers (Delgado et al., 2011, Nanchang Communication, and the SWCS and WASWAC position statements, support the conclusions from the worldwide literature that without implementation of soil and water conservation practices for climate change mitigation and adaptation, the survival of life, including our own species, will be in jeopardy, since soils will be key to meeting the higher demands for food during the 21st century.

  6. Scaled experiments using the helium technique to study the vehicular blockage effect on longitudinal ventilation control in tunnels

    DEFF Research Database (Denmark)

    Alva, Wilson Ulises Rojas; Jomaas, Grunde; Dederichs, Anne

    2015-01-01

    A model tunnel (1:30 compared to a standard tunnel section) with a helium-air smoke mixture was used to study the vehicular blockage effect on longitudinal ventilation smoke control. The experimental results showed excellent agreement with full-scale data and confirmed that the critical velocity...... decreases in proportion with the blockage ratio. Nevertheless, it was found that the relative position of the fire source and the relative size of the vehicular blockage can have an opposite effect, as the vehicular blockage influenced the critical and confinement velocity. The method demonstrated...... the ability to provide valuable information on the effect of vehicular blockage on tunnel fire dynamics....

  7. 76 FR 17424 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-03-29

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Communications System, National Protection and Programs Directorate, Department of Homeland Security, 245 Murray...

  8. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be... advises the President on issues and problems related to implementing national security and emergency...

  9. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... INFORMATION: The NSTAC advises the President on issues and problems related to implementing national security...

  10. Degree of urbanization and mortality from motor vehicular crashes.

    Science.gov (United States)

    Ryb, Gabriel E; Dischinger, Patricia C; McGwin, Gerald; Griffin, Russell L

    2012-01-01

    : The purpose of this study is to establish whether motor vehicular crash (MVC) case fatality varies across different urbanization levels in the USA using a representative sample of crashes. : Odds ratios (ORs) and 95% confidence intervals (CIs) for the association between urbanization level [i.e., central city (CC), suburban (SU) and others (OT)] and mortality were estimated in the 1997 - 2010 National Automotive Sampling System Crashworthiness Data System. Multiple logistic regression was used to adjust for confounders. Analysis was repeated for the occurrence of pre-hospital and hospital deaths. : 49,040,520 weighted occupants were included in the study. The distribution of occupants by urbanization categories was: SU 45%, OT 42%, and CC 13%. Case fatality was higher among OT occupants (0.81%) than among SU (0.51%) and CC (0.37%) occupants. Similar findings were present for pre-hospital deaths (OT 0.52%, SU 0.30%, and CC 0.21%) and hospital deaths (OT 0.29%, SU 0.21%, and CC 0.16%). Multivariate analysis revealed that adjusted odds of death were higher for OT cases [OR=1.55 (1.05-2.30)] than the CC. Adjusted odds of death for SU (OR=1.05 (0.81-1.37) were not different than CCs. Similar but accentuated findings were found for pre-hospital deaths. In contrast, adjusted odds of hospital death were not different among the 3 groups. : Occupants of vehicles crashing in OT (i.e., rural areas and small cities) experience a higher likelihood of dying after MVCs than those in CC and SU. Pre-hospital deaths, not hospital deaths, are responsible for this disparity.

  11. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    thereby reducing the number of bits required for transmissions . Further assume that the system designers would like even greater security regarding...scenarios. A common systemic security analogy for cognition lies within the context of a command and control structure’s observe, orient, decide... telephony , satellite communications and networks). Critical Program Information (CPI): ICT that is a critical component is defined as Critical

  12. Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs)

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.

  13. A Spectrum Handoff Scheme for Optimal Network Selection in NEMO Based Cognitive Radio Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-01-01

    Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.

  14. Application environmental epidemiology to vehicular air pollution and health effects research.

    Science.gov (United States)

    Patil, Rajan R; Chetlapally, Satish Kumar; Bagvandas, M

    2015-01-01

    Vehicular pollution is one of the major contributors to the air pollution in urban areas and perhaps and accounts for the major share of anthropogenic green-house gases such as carbon dioxide, carbon monoxide, nitrogen oxides. Knowledge of human health risks related to environmental exposure to vehicular pollution is a current concern. Analyze the range health effects are attributed varied constituents of vehicular air pollution examine evidence for a causal association to specific health effect. In many instances scenario involves exposure to very low doses of putative agents for extended periods, sometimes the period could mean over a lifetime of an individual and yet may result in small increase in health risk that may be imperceptible. Secondary data analysis and literature review. In environmental exposures, traditional epidemiological approaches evaluating mortality and morbidity indicators display many limiting factors such as nonspecificity of biological effects latency time between exposure and magnitude of the effect. Long latency period between exposure and resultant disease, principally for carcinogenic effects and limitation of epidemiological studies for detecting small risk increments. The present paper discusses the methodological challenges in studying vehicular epidemiology and highlights issues that affect the validity of epidemiological studies in vehicular pollution.

  15. Do vehicular emissions dominate the source of C6-C8 aromatics in the megacity Shanghai of eastern China?

    Science.gov (United States)

    Wang, Hongli; Wang, Qian; Chen, Jianmin; Chen, Changhong; Huang, Cheng; Qiao, Liping; Lou, Shengrong; Lu, Jun

    2015-01-01

    The characteristic ratios of volatile organic compounds (VOCs) to i-pentane, the indicator of vehicular emissions, were employed to apportion the vehicular and non-vehicular contributions to reactive species in urban Shanghai. Two kinds of tunnel experiments, one tunnel with more than 90% light duty gasoline vehicles and the other with more than 60% light duty diesel vehicles, were carried out to study the characteristic ratios of vehicle-related emissions from December 2009 to January 2010. Based on the experiments, the characteristic ratios of C6-C8 aromatics to i-pentane of vehicular emissions were 0.53 ± 0.08 (benzene), 0.70 ± 0.12 (toluene), 0.41 ± 0.09 (m,p-xylenes), 0.16 ± 0.04 (o-xylene), 0.023 ± 0.011 (styrene), and 0.15 ± 0.02 (ethylbenzene), respectively. The source apportionment results showed that around 23.3% of C6-C8 aromatics in urban Shanghai were from vehicular emissions, which meant that the non-vehicular emissions had more importance. These findings suggested that emission control of non-vehicular sources, i.e. industrial emissions, should also receive attention in addition to the control of vehicle-related emissions in Shanghai. The chemical removal of VOCs during the transport from emissions to the receptor site had a large impact on the apportionment results. Generally, the overestimation of vehicular contributions would occur when the VOC reaction rate constant with OH radicals (kOH) was larger than that of the vehicular indicator, while for species with smaller kOH than the vehicular indicator, the vehicular contribution would be underestimated by the method of characteristic ratios. Copyright © 2014. Published by Elsevier B.V.

  16. Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

    Directory of Open Access Journals (Sweden)

    Baras JohnS

    2011-01-01

    Full Text Available We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs on messages sourced by the device. The authentication protocol requires a centralized infrastructure in the network: we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority (CA and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite's role as the CA and sender proxy. Through analysis, we show that the authentication protocol is secure against malicious adversaries. We also present detailed simulation results that demonstrate that the proposed protocol is much cheaper than traditional public key-based authentication technologies for metrics like processing delay, storage requirements, and energy consumption of the smart devices.

  17. VANET '13: Proceeding of the Tenth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications

    NARCIS (Netherlands)

    Gozalvez, J.; Kargl, Frank; Mittag, J.; Kravets, R.; Tsai, M.; Unknown, [Unknown

    This year marks a very important date for the ACM international workshop on Vehicular inter-networking, systems, and applications as ACM VANET celebrates now its 10th edition. Starting in 2004 as "ACM international workshop on Vehicular ad hoc networks" already the change in title indicates that

  18. RPD: Reusable Pseudo-Id Distribution for a Secure and Privacy Preserving VANET

    Directory of Open Access Journals (Sweden)

    Sulaiman Ashraph

    2013-08-01

    Full Text Available In any VANET, security and privacy are the two fundamental issues. Obtaining efficient security in vehicular communication is essential without compromising privacy-preserving mechanisms. Designing a suitable protocol for VANET by having these two issues in mind is challenging because efficiency, unlinkablity and traceability are the three qualities having contradictions between them. In this paper, we introduce an efficient Reusable Pseudo-id Distribution (RPD scheme. The Trusted Authority (TA designating the Road Side Units (RSUs to generate n reusable pseudo ids and distribute them to the On Board Units (OBUs on request characterizes the proposed protocol. RSUs issue the aggregated hashes of all its valid pseudo-ids along with a symmetric shared key and a particular pseudo-id to each vehicle that enters into its coverage range. Through this the certificates attached to the messages can be eliminated and thus resulting in a significantly reduced packet size. The same anonymous keys can then be re-distributed by the RSUs episodically to other vehicles. We analyze the proposed protocol extensively to demonstrate its merits and efficiency.

  19. Doses due to extra-vehicular activity on space stations

    Energy Technology Data Exchange (ETDEWEB)

    Deme, S.; Apathy, I.; Feher, I. [KFKI Atomic Energy Research Institute, Budapest (Hungary); Akatov, Y.; Arkhanguelski, V. [Institute of Biomedical Problems, State Scientific Center, Moscow (Russian Federation); Reitz, G. [DLR Institute of Aerospace Medicine, Cologne, Linder Hohe (Germany)

    2006-07-01

    One of the many risks of long duration space flight is the dose from cosmic radiation, especially during periods of intensive solar activity. At such times, particularly during extra-vehicular activity (E.V.A.), when the astronauts are not protected by the wall of the spacecraft, cosmic radiation is a potentially serious health threat. Accurate dose measurement becomes increasingly important during the assembly of large space objects. Passive integrating detector systems such as thermoluminescent dosimeters (TLDs) are commonly used for dosimetric mapping and personal dosimetry on space vehicles. K.F.K.I. Atomic Energy Research Institute has developed and manufactured a series of thermoluminescent dosimeter systems, called Pille, for measuring cosmic radiation doses in the 3 {mu}Gy to 10 Gy range, consisting of a set of CaSO{sub 4}:Dy bulb dosimeters and a small, compact, TLD reader suitable for on-board evaluation of the dosimeters. Such a system offers a solution for E.V.A. dosimetry as well. By means of such a system, highly accurate measurements were carried out on board the Salyut-6, -7 and Mir Space Stations, on the Space Shuttle, and most recently on several segments of the International Space Station (I.S.S.). The Pille system was used to make the first measurements of the radiation exposure of cosmonauts during E.V.A.. Such E.V.A. measurements were carried out twice (on June 12 and 16, 1987) by Y. Romanenko, the commander of the second crew of Mir. During the E.V.A. one of the dosimeters was fixed in a pocket on the outer surface of the left leg of his space-suit; a second dosimeter was located inside the station for reference measurements. The advanced TLD system Pille 96 was used during the Nasa-4 (1997) mission to monitor the cosmic radiation dose inside the Mir Space Station and to measure the exposure of two of the astronauts during their E.V.A. activities. The extra doses of two E.V.A. during the Euromir 95 and one E.V.A. during the Nasa4 experiment

  20. Multiply Surface-Functionalized Nanoporous Carbon for Vehicular Hydrogen Storage

    Energy Technology Data Exchange (ETDEWEB)

    Pfeifer, Peter [Univ. of Missouri, Columbia, MO (United States). Dept. of Physics; Gillespie, Andrew [Univ. of Missouri, Columbia, MO (United States). Dept. of Physics; Stalla, David [Univ. of Missouri, Columbia, MO (United States). Dept. of Physics; Dohnke, Elmar [Univ. of Missouri, Columbia, MO (United States). Dept. of Physics

    2017-02-20

    The purpose of the project “Multiply Surface-Functionalized Nanoporous Carbon for Vehicular Hydrogen Storage” is the development of materials that store hydrogen (H2) by adsorption in quantities and at conditions that outperform current compressed-gas H2 storage systems for electric power generation from hydrogen fuel cells (HFCs). Prominent areas of interest for HFCs are light-duty vehicles (“hydrogen cars”) and replacement of batteries with HFC systems in a wide spectrum of applications, ranging from forklifts to unmanned areal vehicles to portable power sources. State-of-the-art compressed H2 tanks operate at pressures between 350 and 700 bar at ambient temperature and store 3-4 percent of H2 by weight (wt%) and less than 25 grams of H2 per liter (g/L) of tank volume. Thus, the purpose of the project is to engineer adsorbents that achieve storage capacities better than compressed H2 at pressures less than 350 bar. Adsorption holds H2 molecules as a high-density film on the surface of a solid at low pressure, by virtue of attractive surface-gas interactions. At a given pressure, the density of the adsorbed film is the higher the stronger the binding of the molecules to the surface is (high binding energies). Thus, critical for high storage capacities are high surface areas, high binding energies, and low void fractions (high void fractions, such as in interstitial space between adsorbent particles, “waste” storage volume by holding hydrogen as non-adsorbed gas). Coexistence of high surface area and low void fraction makes the ideal adsorbent a nanoporous monolith, with pores wide enough to hold high-density hydrogen films, narrow enough to minimize storage as non-adsorbed gas, and thin walls between pores to minimize the volume occupied by solid instead of hydrogen. A monolith can be machined to fit into a rectangular tank (low pressure, conformable tank), cylindrical tank