Filters








15,173 Hits in 8.1 sec

Quantum networks: where should we be heading?

Masahide Sasaki
2017 Quantum Science and Technology  
Our discussions are summarised in a roadmap. Introduction Quantum key distribution (QKD) is the most promising application of quantum information technologies.  ...  At present networking of QKD is made by using trusted nodes in such a way that a key is relayed up to a terminal by OTP encapsulation, spending the keys generated in neighbouring QKD links [1-6].  ...  Acknowledgements The author thanks M Fujiwara, M Takeoka, K Yoshino, A Tajima, A Tomita, K Tamaki, J Braun, J Buchmann, D Demirel, M Geihs, S Moriai, A Waseda and W Ogata for their collaborations.  ... 
doi:10.1088/2058-9565/aa6994 fatcat:oo2hckq7fvbvhpragiwrvv2umm

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  However, if it is desirable to use a secret key for encryption, then information-theoretic security also describes techniques that allow for the evolution of such a key over wireless channels that are  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Trust Establishment in Mobile Ad Hoc Networks: Key Management [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Applications  
In a hostile environment, such as the battle field, an ad hoc network's distributive architecture eliminates the problem of a vulnerable network host or the loss of the network host.  ...  The modern battle field is characterized by highly mobile forces and the effect of a network which fails to maintain communication and high mobility is disastrous.  ...  Key Agreement Key agreement is used to enable two participants to agree upon a secret key. In this way, keys are shared and establish a secure communication line over which a session can be run.  ... 
doi:10.5772/12866 fatcat:7kgddqyqazf25gndtrwwwwz5n4

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2018 IEEE Access  
The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key  ...  Index Terms-5G wireless network systems, security, authentication, availability, confidentiality, key management, privacy, heterogenous networks, device-to-device communications, massive multiple-input  ...  The authentication and key agreement (AKA) in 4G LTE cellular networks is symmetric-key based.  ... 
doi:10.1109/access.2017.2779146 fatcat:yjroccchnbbzbmmlmug4q7ge4q

Physical-Layer Security in 6G Networks

L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, A. Stoica, G. Abreu, H. Haas
2021 IEEE Open Journal of the Communications Society  
To trust the services provided by such network, security is a mandatory feature by design.  ...  This paper discusses challenges, solutions and visions of PLS in beyond-5G networks.  ...  It has been a challenge in information theory for decades to find practical ways to realize information-theoretic secrecy.  ... 
doi:10.1109/ojcoms.2021.3103735 fatcat:kcntnplyqnc45bp5i5wceiwk4m

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.  ...  The evolution towards 5G wireless communications poses new challenges for physical layer security research.  ...  key agreement.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

A Novel Approach For Verifiable Secret Sharing In Proactive Network Using Rsa

Vikas Kumar, Prof. O.P. Verma, Deepak Kumar, Sandeep Jain
2017 Zenodo  
We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a  ...  The solution is based on a three-round solution of so-called weak verifiable secret sharing (WSS), for which we also prove that three rounds are a lower bound.  ...  RSA is a cryptosystem for public-key encryption and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.  ... 
doi:10.5281/zenodo.581480 fatcat:fxelltio7zgtvfprmque3skvka

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.  ...  The purpose of this paper is to provide a comprehensive summarization of the latest physical layer security research results on the key technologies of 5G wireless networks.  ...  The defense strategy in [62] is used for secret key agreement.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Survey on Threats and Attacks on Mobile Networks

Silvere Mavoungou, Georges Kaddoum, Mostafa Taha, Georges Matar
2016 IEEE Access  
These drawbacks stand as a major concern for the security and the performance of mobile networks, since various types of attacks can take down the whole network and cause a denial of service, or perform  ...  In this survey, we review the main security issues in the access and core network (vulnerabilities and threats) and provide a classification and categorization of attacks in mobile network.  ...  Solutions based on information-theoretic security, artificial noise aided security, security-oriented beamforming techniques, diversity-assisted security approaches, and physical-layer secret key generation  ... 
doi:10.1109/access.2016.2601009 fatcat:25ch2hct5vc2ngc7aaqirvscpi

Experimental quantum secure network with digital signatures and encryption [article]

Hua-Lei Yin, Yao Fu, Chen-Long Li, Chen-Xun Weng, Bing-Hong Li, Jie Gu, Yu-Shuo Lu, Shan Huang, Zeng-Bing Chen
2022 arXiv   pre-print
Furthermore, we build the first all-in-one quantum secure network integrating information-theoretically secure communication, digital signatures, secret sharing, and conference key agreement and experimentally  ...  We just need to use a 384-bit key to sign documents of up to 2^64 lengths with a security bound of 10^-19.  ...  BK20211145), the Fundamental Research Funds for the Central Universities (No. 020414380182), the Key Research and Development Program of Nanjing Jiangbei New Aera (No.  ... 
arXiv:2107.14089v4 fatcat:vpx527quvrf4hlrv7damyh7cfe

One-Time Broadcast Encryption Schemes in Distributed Sensor Networks

Pawel Szalachowski, Zbigniew Kotulski
2012 International Journal of Distributed Sensor Networks  
Broadcasting is a message-transferring method characteristic for majority of sensor networks.  ...  He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient.  ...  Security of Scheme based on Shamir's Secret Sharing Scheme which is perfect secure (information-theoretic secure) [42, 43] .  ... 
doi:10.1155/2012/536718 fatcat:esbtngixzrgilghqvxsqsk5fze

Safety Challenges and Solutions in Mobile Social Networks

Yashar Najaflou, Behrouz Jedari, Feng Xia, Laurence T. Yang, Mohammad S. Obaidat
2015 IEEE Systems Journal  
However, lack of a protective infrastructure in these networks has turned them in to convenient targets for various perils.  ...  In this paper, we aim to provide a clear categorization on safety challenges and a deep exploration over some recent solutions in MSNs.  ...  It is a privacy-enhanced security framework consisting of authentication and key agreement protocols for wireless mesh networks (WMNs).  ... 
doi:10.1109/jsyst.2013.2284696 fatcat:so3qnnbk65axhn2upzmemss2he

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  The user thereof uses the information at its sole risk and liability. References  ...  The Diffie-Hellman key agreement protocol gives the first practical solution to the key exchange problem for two parties.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Security in wireless sensor networks

Venkata C. Giruka, Mukesh Singhal, James Royalty, Srilekha Varanasi
2007 Wireless Communications and Mobile Computing  
We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.  ...  These differences indicate that protocols that are valid in the context of ad-hoc networks may not be directly applicable for sensor networks.  ...  Acknowledgements Authors would like to thank Venkata Deepti Kiran Bhuma, Janani Venkateswaran, and Swapna kothapally, for helping us with literature review.  ... 
doi:10.1002/wcm.422 fatcat:en3cdj76hfaclpnezilitao6xe

Long term confidentiality: a survey

Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
2012 Designs, Codes and Cryptography  
Long term confidentiality is ensured by information theoretically secure ciphers, but at the expense of impractical key agreement and key management.  ...  We overview known methods to alleviate these problems, whilst retaining some form of information theoretic security relevant for long term confidentiality.  ...  Key agreement from information theory In this section we survey known solutions for information theoretic key agreement.  ... 
doi:10.1007/s10623-012-9747-6 fatcat:uk3afgjhrfduxeytawbqkvt4fq
« Previous Showing results 1 — 15 out of 15,173 results