نتایج جستجو برای: distance relay
تعداد نتایج: 254950 فیلتر نتایج به سال:
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...
In this letter, a two-slot secondary non-orthogonal multiple access (NOMA) relay is used to assist spectrum sharing, where the primary transceivers with long distance communicate through the relay. First, the information for the primary receiver (PR) and secondary receivers (SRs) is transmitted via the NOMA relay. Then, the information for PR is re-transmitted to it through a selected SR to imp...
The research on distributed MIMO relay system has been attracting much attention. In this paper, a decode-and-forward scheme distributed MIMO relay system is examined. For upper bound of channel capacity, the distance between transceivers is optimized when the propagation loss is brought close to actuality. Additionally, the number of relay is optimized whether total antenna element is fixed or...
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...
Utility engineers and consultants use relay models to select the relay types suited for a particular application, and to analyze the performance of relays that appear to either operate incorrectly or fail to operate on the occurrence of a fault. Instead of using actual prototypes, manufacturers use relay model designing to expedite and economize the process of developing new relays. Electric po...
–Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The Adhoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among them is Worm Hole attack which really challenges researchers to provide solution for preventing ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید