نتایج جستجو برای: distance relay

تعداد نتایج: 254950  

Journal: :IACR Cryptology ePrint Archive 2016
Mathilde Igier Serge Vaudenay

Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...

2018
Bingcai Chen Yu Chen Yunfei Chen Nan Zhao Zhiguo Ding

In this letter, a two-slot secondary non-orthogonal multiple access (NOMA) relay is used to assist spectrum sharing, where the primary transceivers with long distance communicate through the relay. First, the information for the primary receiver (PR) and secondary receivers (SRs) is transmitted via the NOMA relay. Then, the information for PR is re-transmitted to it through a selected SR to imp...

2013
Pham Thanh Hiep

The research on distributed MIMO relay system has been attracting much attention. In this paper, a decode-and-forward scheme distributed MIMO relay system is examined. For upper bound of channel capacity, the distance between transceivers is optimized when the propagation loss is brought close to actuality. Additionally, the number of relay is optimized whether total antenna element is fixed or...

Journal: :J. Network and Computer Applications 2011
Gerhard P. Hancke

Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols have been proposed the security of these proposals are dependent on the underlying communication channel. Conventional communication channels have been shown to be inappropriate for implementing distance bounding, as t...

2012
Hamid H. Sherwali

Utility engineers and consultants use relay models to select the relay types suited for a particular application, and to analyze the performance of relays that appear to either operate incorrectly or fail to operate on the occurrence of a fault. Instead of using actual prototypes, manufacturers use relay model designing to expedite and economize the process of developing new relays. Electric po...

2012
Dr. K. Chitra

–Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The Adhoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among them is Worm Hole attack which really challenges researchers to provide solution for preventing ...

Journal: :IOSR Journal of Electrical and Electronics Engineering 2016

Journal: :International Journal of Control and Automation 2015

Journal: :FUOYE Journal of Engineering and Technology 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید