نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

2014
Dac-Binh Ha Truong Tien Vu

1 Abstract—The broadcast nature of wireless communications makes it vulnerable to attack or eavesdropping. Therefore, information security is an important issue in wireless communications, especially in distributed networks such as wireless sensor networks and ad hoc wireless networks. In this paper, we present the physical layer secrecy performance analysis of singleinput single-output (SISO) ...

2017
Bin Yang Jianfeng Zhang

Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation secur...

Journal: :Optics express 2010
Lars Lydersen Carlos Wiechers Christoffer Wittmann Dominique Elser Johannes Skaar Vadim Makarov

It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [Nat. Photonics 4, 686 (2010)]. This allows for an attack eavesdropping the full raw and secret key without increasing ...

2004
Thomas Durt

In this paper we consider a generalisation of Ekert’s entanglement-based quantum cryptographic protocol where qubits are replaced by quN its (i.e., N -dimensional systems). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. For doing so, we generalize Cerf’s formalism for clo...

2014
Yue Qiao Kannan Srinivasan Anish Arora

Existing secret key extraction techniques use quantization to map wireless channel amplitudes to secret bits. This paper shows that such techniques are highly prone to environment and local noise effects: They have very high mismatch rates between the two nodes that measure the channel between them. This paper advocates using the shape of the channel instead of the size (or amplitude) of the ch...

2005
Qing-yu Cai

It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e., the eavesdropper (Eve) replaces one photon of the multiphoton pulse by a false one and forwards...

Journal: :Entropy 2017
Luis A. Lizama-Pérez Jose Mauricio Lopez-Romero Eduardo De Carlos-López

Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution...

Journal: :IEEE Communications Letters 2016

Journal: :CoRR 2011
Rahul Vaze

Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید